Results 41 to 50 of about 116,815 (231)

Agri-Food Traceability Management using a RFID System with Privacy Protection [PDF]

open access: yes, 2007
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in food, an efficient tracking and tracing system is required.
Bernardi, Paolo   +5 more
core   +2 more sources

From Golden to Unimodular Cryptography [PDF]

open access: yesChaos, Solitons and Fractals, 105 (2017) pp. 208-214, 2019
We introduce a natural generalization of the golden cryptography, which uses general unimodular matrices in place of the traditional Q-matrices, and prove that it preserves the original error correction properties of the encryption. Moreover, the additional parameters involved in generating the coding matrices make this unimodular cryptography ...
arxiv   +1 more source

A STUDY OF BILINEAR MAPS IN WIRELESS SENSOR NETWORKS

open access: yesICTACT Journal on Communication Technology, 2017
In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled by symmetric cryptography systems. But, today by introduction of new needs in these networks and their security development, researchers of security and ...
Reza Alimoradi   +2 more
doaj   +1 more source

Quantum‐resistant anonymous identity‐based encryption with trable identities

open access: yesIET Information Security, 2022
Identity‐based encryption (IBE), introduced by Shamir, eliminates the need for public‐key infrastructure. The sender can simply encrypt a message by using the recipient's identity (such as email or IP address) without needing to look up the public key ...
Zi‐Yuan Liu   +4 more
doaj   +1 more source

An efficient certificateless blind signature scheme without bilinear pairing

open access: yesAnais da Academia Brasileira de Ciências, 2014
Recently, the certificateless public key cryptography (CLPKC) has been studied widely since it could solve both of the certificate management problem in traditional public key cryptography (TPKC) and the key escrow problem in the identity-based public ...
GUOFAGN DONG   +3 more
doaj   +1 more source

07381 Executive Summary - Cryptography [PDF]

open access: yes, 2008
The topics covered in the seminar spanned most areas of cryptography, in one way or another, both in terms of the types of schemes (public-key cryptography, symmetric cryptography, hash functions and other cryptographic functions, multi-party protocols ...
  +3 more
core   +1 more source

Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions [PDF]

open access: yesarXiv, 2023
With the ever-growing concern for internet security, the field of quantum cryptography emerges as a promising solution for enhancing the security of networking systems. In this paper, 20 notable papers from leading conferences and journals are reviewed and categorized based on their focus on various aspects of quantum cryptography, including key ...
arxiv  

Pseudo Random Generator Based Public Key Cryptography [PDF]

open access: yes, 2017
Advances in communication technology have seen strong interest in digital data transmission. However, illegal data access has become more easy and prevalent in wireless and general communication networks.
Bhatia, K. (Kirti), Saini, N. (Neha)
core   +1 more source

Quantum asymmetric cryptography with symmetric keys

open access: yes, 2008
Based on quantum encryption, we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system.
A. Kawachi   +41 more
core   +1 more source

Subsets of groups in public-key cryptography [PDF]

open access: yes, 2023
We suggest the usage of algebraic subsets instead of subgroups in public-key cryptography. In particular, we present the subset version of two protocols introduced by Shpilrain and Ushakov with some examples in ascending HNN-extensions of free-abelian ...
Carvalho, André, Malheiro, António
core  

Home - About - Disclaimer - Privacy