Results 291 to 300 of about 535,713 (347)
Some of the next articles are maybe not open access.
2010
In this chapter, we will explore some computational aspects of modular arithmetic, which we studied in Chapter 6. We will be concerned about how to compute certain numbers in a most efficient way. There is a whole field at work here, of which we barely scratch the surface, called computational complexity.
Matthias Beck, Ross Geoghegan
openaire +1 more source
In this chapter, we will explore some computational aspects of modular arithmetic, which we studied in Chapter 6. We will be concerned about how to compute certain numbers in a most efficient way. There is a whole field at work here, of which we barely scratch the surface, called computational complexity.
Matthias Beck, Ross Geoghegan
openaire +1 more source
2018
In this short chapter, we talk a bit about cryptography. First, we discuss some classical sorts of private key methods, and their limitations in the modern world. We then look at the first public key cryptographic method.
openaire +1 more source
In this short chapter, we talk a bit about cryptography. First, we discuss some classical sorts of private key methods, and their limitations in the modern world. We then look at the first public key cryptographic method.
openaire +1 more source
Computer, 1996
The RSA algorithm can be used for a kind of unforgeable digital signature. In this application, the secret key is used to encrypt a message, which can then itself be decrypted by anyone possessing the public key. Digital signatures can play a role in many activities that do not require secrecy but require sender authentication and guaranteed message ...
openaire +1 more source
The RSA algorithm can be used for a kind of unforgeable digital signature. In this application, the secret key is used to encrypt a message, which can then itself be decrypted by anyone possessing the public key. Digital signatures can play a role in many activities that do not require secrecy but require sender authentication and guaranteed message ...
openaire +1 more source
Secure Healthcare Framework Using Blockchain and Public Key Cryptography
Blockchain Cybersecurity, Trust and Privacy, 2020Randhir Kumar, Rakesh Tripathi
semanticscholar +1 more source
Optical image encryption algorithm based on hyper-chaos and public-key cryptography
Optics and Laser Technology, 2020Yujia Liu +4 more
semanticscholar +1 more source
Journal of Network and Computer Applications, 2019
Bidi Ying, A. Nayak
semanticscholar +1 more source
Bidi Ying, A. Nayak
semanticscholar +1 more source
An efficient certificateless public key cryptography with authorized equality test in IIoT
Journal of Ambient Intelligence and Humanized Computing, 2019Rashad Elhabob +3 more
semanticscholar +1 more source
Secure limitation analysis of public-key cryptography for smart card settings
World wide web (Bussum), 2019Youliang Tian +3 more
semanticscholar +1 more source
Security in quantum cryptography
Reviews of Modern Physics, 2022Christopher Portmann, Renato Renner
exaly

