Results 61 to 70 of about 116,815 (231)
The integration of lattice‐based cryptography principles with Quantum Key Distribution (QKD) protocols is explored to enhance security in the context of Internet of Things (IoT) ecosystems.
Sujit Biswas+4 more
doaj +1 more source
Multivariate Quadratic Equations in Public-key Cryptography
The work is dedicated to appliances of multivariate quadratic equations in modern public-key cryptography. The existing cryptosystems are reviewed, pointing out their pros and contras.
Andrey Valerievich Zhatkin
doaj
Inverse matrices with applications in public-key cryptography
The applications of non-square binary matrices span many domains including mathematics, error-correction coding, machine learning, data storage, navigation signals, and cryptography.
Farshid Haidary Makoui+1 more
doaj +1 more source
Indexing Properties of Primitive Pythagorean Triples for Cryptography Applications [PDF]
This paper presents new properties of Primitive Pythagorean Triples (PPT) that have relevance in applications where events of different probability need to be generated and in cryptography.
arxiv
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core +3 more sources
Assessment of Work Pedestal on RSA in Text Cryptographic System [PDF]
Cryptography is a Greek word, crypto signifies ‘hidden or covered up’ and graphy means ‘study’. The conversion of plain text to cipher text is called as encryption and changing the cipher text to plain text is called as decryption.
Panwar , Aashish+2 more
core +1 more source
Analisis Dan Implementasi Algoritma Kriptografi Kunci Publik Rsa Dan Luc Untuk Penyandian Data [PDF]
The use of data communication networks between various computer systems have developed rapidly in various fields, so that the necessary existence of other systems maintain the confidentiality and security of data exchange.In handling the security and ...
Setiaji, B. (Bayu)
core
Modern Symmetric Cryptography methodologies and its applications [PDF]
Nowadays, using cryptographic systems play an effective role in security and safety technologies. One of the most applied kind of cryptography is Symmetric Cryptography and its applications. New aspects of symmetric Cryptography methodologies and applications has been presented by this paper.
arxiv
Offline Mobile Payments Using Public Key Cryptography [PDF]
This disclosure describes techniques for the user of a mobile device to electronically pay another user using a payments app even in the absence of internet connectivity.
Deselaers, Thomas, Feuz, Sandro
core +1 more source
Quantum Key Distribution for V2I communications with software‐defined networking
The evolution of Connected and Autonomous Vehicles (CAVs) promises improvements in our travel experience and the potential to enhance road safety and reduce environmental impact.
Alexandros Stavdas+9 more
doaj +1 more source