Results 61 to 70 of about 509,074 (260)
Identity based cryptography from bilinear pairings [PDF]
This report contains an overview of two related areas of research in cryptography which have been prolific in significant advances in recent years. The first of these areas is pairing based cryptography.
Barbosa, Manuel
core
The integration of lattice‐based cryptography principles with Quantum Key Distribution (QKD) protocols is explored to enhance security in the context of Internet of Things (IoT) ecosystems.
Sujit Biswas +4 more
doaj +1 more source
IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker.
Md Nizam Udin +5 more
doaj +1 more source
Multivariate Quadratic Equations in Public-key Cryptography
The work is dedicated to appliances of multivariate quadratic equations in modern public-key cryptography. The existing cryptosystems are reviewed, pointing out their pros and contras.
Andrey Valerievich Zhatkin
doaj
Public-key cryptography and invariant theory
Public-key cryptosystems are suggested based on invariants of groups.
Grigoriev, D.
core +1 more source
Quantum Key Distribution for V2I communications with software‐defined networking
The evolution of Connected and Autonomous Vehicles (CAVs) promises improvements in our travel experience and the potential to enhance road safety and reduce environmental impact.
Alexandros Stavdas +9 more
doaj +1 more source
Survey on SAP and its application in public-key cryptography
The concept of the semigroup action problem (SAP) was first introduced by Monico in 2002. Monico explained in his paper that the discrete logarithm problem (DLP) can be generalized to SAP. After defining the action problem in a semigroup, the concept was
Goel Neha, Gupta Indivar, Dass B. K.
doaj +1 more source
Some cryptographic algorithms [PDF]
Cryptography is the practice and study of techniques for secure communication in the presence of third parties, called adversaries. Modern cryptography is heavily based on mathematical theory and computer science practice.
Satpathy, S
core
Novel Architecture for Efficient Implementation of Modular Exponentiation Algorithm [PDF]
One of the most difficult problems in web research is security. Cryptography is the fundamental technique utilized in secure communication. One key element of cryptography is Public-Key Cryptography (PKC).
Abdalhossein Rezai
doaj +1 more source
Combinatorial group theory and public key cryptography
After some excitement generated by recently suggested public key exchange protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al., it is a prevalent opinion now that the conjugacy search problem is unlikely to provide sufficient level of security if a ...
Shpilrain, Vladimir, Zapata, Gabriel
core +2 more sources

