Results 41 to 50 of about 116,815 (231)
Agri-Food Traceability Management using a RFID System with Privacy Protection [PDF]
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in food, an efficient tracking and tracing system is required.
Bernardi, Paolo+5 more
core +2 more sources
From Golden to Unimodular Cryptography [PDF]
We introduce a natural generalization of the golden cryptography, which uses general unimodular matrices in place of the traditional Q-matrices, and prove that it preserves the original error correction properties of the encryption. Moreover, the additional parameters involved in generating the coding matrices make this unimodular cryptography ...
arxiv +1 more source
A STUDY OF BILINEAR MAPS IN WIRELESS SENSOR NETWORKS
In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled by symmetric cryptography systems. But, today by introduction of new needs in these networks and their security development, researchers of security and ...
Reza Alimoradi+2 more
doaj +1 more source
Quantum‐resistant anonymous identity‐based encryption with trable identities
Identity‐based encryption (IBE), introduced by Shamir, eliminates the need for public‐key infrastructure. The sender can simply encrypt a message by using the recipient's identity (such as email or IP address) without needing to look up the public key ...
Zi‐Yuan Liu+4 more
doaj +1 more source
An efficient certificateless blind signature scheme without bilinear pairing
Recently, the certificateless public key cryptography (CLPKC) has been studied widely since it could solve both of the certificate management problem in traditional public key cryptography (TPKC) and the key escrow problem in the identity-based public ...
GUOFAGN DONG+3 more
doaj +1 more source
07381 Executive Summary - Cryptography [PDF]
The topics covered in the seminar spanned most areas of cryptography, in one way or another, both in terms of the types of schemes (public-key cryptography, symmetric cryptography, hash functions and other cryptographic functions, multi-party protocols ...
+3 more
core +1 more source
Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions [PDF]
With the ever-growing concern for internet security, the field of quantum cryptography emerges as a promising solution for enhancing the security of networking systems. In this paper, 20 notable papers from leading conferences and journals are reviewed and categorized based on their focus on various aspects of quantum cryptography, including key ...
arxiv
Pseudo Random Generator Based Public Key Cryptography [PDF]
Advances in communication technology have seen strong interest in digital data transmission. However, illegal data access has become more easy and prevalent in wireless and general communication networks.
Bhatia, K. (Kirti), Saini, N. (Neha)
core +1 more source
Quantum asymmetric cryptography with symmetric keys
Based on quantum encryption, we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system.
A. Kawachi+41 more
core +1 more source
Subsets of groups in public-key cryptography [PDF]
We suggest the usage of algebraic subsets instead of subgroups in public-key cryptography. In particular, we present the subset version of two protocols introduced by Shpilrain and Ushakov with some examples in ascending HNN-extensions of free-abelian ...
Carvalho, André, Malheiro, António
core