Results 31 to 40 of about 529,456 (364)

Public Key Cryptography

open access: yesLecture Notes in Computer Science, 2014
This report documents the program and results of Dagstuhl seminar 16731 “Public-Key Cryptography” which took place September 11–16, 2016. The goal of the seminar was to bring together different subareas from public-key cryptography and to promote ...
Kazue Sako
semanticscholar   +2 more sources

Homomorphic signcryption with public plaintext‐result checkability

open access: yesIET Information Security, 2021
Signcryption originally proposed by Zheng (CRYPTO′97) is a useful cryptographic primitive that provides strong confidentiality and integrity guarantees.
Shimin Li   +3 more
doaj   +1 more source

A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things

open access: yesIEEE Access, 2019
The Internet of Things envisages connecting all physical objects or things to the Internet, using devices as diverse as smartphones, coffee makers, washing machines, automobiles, lamps, and wearable devices, among many others.
Manisha Malik, M. Dutta, J. Granjal
semanticscholar   +1 more source

Realization Scheme for Visual Cryptography with Computer-generated Holograms [PDF]

open access: yesarXiv, 2022
We propose to realize visual cryptography in an indirect way with the help of computer-generated hologram. At present, the recovery method of visual cryptography is mainly superimposed on transparent film or superimposed by computer equipment, which greatly limits the application range of visual cryptography.
arxiv  

Public Key Cryptography [PDF]

open access: yesJournal of Physics: Conference Series, 2020
Abstract Public Key Cryptography is a software model that presents the process of encoding information, in this case the documents contained in a file. The encoding process begins by determining the master file or document that is ready to be encoded, then by applying the combination method, shifting and implementing the pass phrase to ...
openaire   +1 more source

Analysis of Elliptic Curve Cryptography (ECC) for Energy Efficiency in Wireless Sensor Networks

open access: yesNUST Journal of Engineering Sciences, 2009
Rapid growth of wireless sensor networks (WSN) in recent times has resulted in greater security requirements. One of the primary concerns in wireless sensor networks is energy efficiency and security mechanisms are no different.
Zain Ul Abideen Tariq   +2 more
doaj   +1 more source

Towards an efficient LWE‐based fully homomorphic encryption scheme

open access: yesIET Information Security, 2022
The security of most early fully homomorphic encryption schemes was based on the hardness of the Learning with Errors (LWE) problem. These schemes were inefficient in terms of per gate computations and public‐key size.
Uddipana Dowerah   +1 more
doaj   +1 more source

Analysis Review on Public Key Cryptography Algorithms

open access: yesIndonesian Journal of Electrical Engineering and Computer Science, 2018
This paper presents several Public Key Cryptography (PKC) algorithms based on the perspective of researchers’ effort since it was invented in the last four decades.
Jasmin Ilyani Ahmad   +2 more
semanticscholar   +1 more source

Agri-Food Traceability Management using a RFID System with Privacy Protection [PDF]

open access: yes, 2007
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in food, an efficient tracking and tracing system is required.
Bernardi, Paolo   +5 more
core   +2 more sources

Quantum-Resistant Cryptography [PDF]

open access: yesarXiv, 2021
Quantum-resistant cryptography is cryptography that aims to deliver cryptographic functions and protocols that remain secure even if large-scale fault-tolerant quantum computers are built. NIST will soon announce the first selected public-key cryptography algorithms in its Post-Quantum Cryptography (PQC) standardization which is the most important ...
arxiv  

Home - About - Disclaimer - Privacy