Results 61 to 70 of about 116,815 (231)

Exploring the fusion of lattice‐based quantum key distribution for secure Internet of Things communications

open access: yesIET Quantum Communication
The integration of lattice‐based cryptography principles with Quantum Key Distribution (QKD) protocols is explored to enhance security in the context of Internet of Things (IoT) ecosystems.
Sujit Biswas   +4 more
doaj   +1 more source

Multivariate Quadratic Equations in Public-key Cryptography

open access: yesБезопасность информационных технологий, 2013
The work is dedicated to appliances of multivariate quadratic equations in modern public-key cryptography. The existing cryptosystems are reviewed, pointing out their pros and contras.
Andrey Valerievich Zhatkin
doaj  

Inverse matrices with applications in public-key cryptography

open access: yesJournal of Algorithms & Computational Technology
The applications of non-square binary matrices span many domains including mathematics, error-correction coding, machine learning, data storage, navigation signals, and cryptography.
Farshid Haidary Makoui   +1 more
doaj   +1 more source

Indexing Properties of Primitive Pythagorean Triples for Cryptography Applications [PDF]

open access: yesarXiv, 2011
This paper presents new properties of Primitive Pythagorean Triples (PPT) that have relevance in applications where events of different probability need to be generated and in cryptography.
arxiv  

LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments

open access: yes, 2008
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core   +3 more sources

Assessment of Work Pedestal on RSA in Text Cryptographic System [PDF]

open access: yes, 2018
Cryptography is a Greek word, crypto signifies ‘hidden or covered up’ and graphy means ‘study’. The conversion of plain text to cipher text is called as encryption and changing the cipher text to plain text is called as decryption.
Panwar , Aashish   +2 more
core   +1 more source

Analisis Dan Implementasi Algoritma Kriptografi Kunci Publik Rsa Dan Luc Untuk Penyandian Data [PDF]

open access: yes, 2015
The use of data communication networks between various computer systems have developed rapidly in various fields, so that the necessary existence of other systems maintain the confidentiality and security of data exchange.In handling the security and ...
Setiaji, B. (Bayu)
core  

Modern Symmetric Cryptography methodologies and its applications [PDF]

open access: yesarXiv, 2009
Nowadays, using cryptographic systems play an effective role in security and safety technologies. One of the most applied kind of cryptography is Symmetric Cryptography and its applications. New aspects of symmetric Cryptography methodologies and applications has been presented by this paper.
arxiv  

Offline Mobile Payments Using Public Key Cryptography [PDF]

open access: yes, 2020
This disclosure describes techniques for the user of a mobile device to electronically pay another user using a payments app even in the absence of internet connectivity.
Deselaers, Thomas, Feuz, Sandro
core   +1 more source

Quantum Key Distribution for V2I communications with software‐defined networking

open access: yesIET Quantum Communication
The evolution of Connected and Autonomous Vehicles (CAVs) promises improvements in our travel experience and the potential to enhance road safety and reduce environmental impact.
Alexandros Stavdas   +9 more
doaj   +1 more source

Home - About - Disclaimer - Privacy