Results 81 to 90 of about 116,815 (231)
On the Security of Certificateless Signature Schemes
Wireless Sensor Network (WSN) has proved its presence in various real time applications and hence the security of such embedded devices is a vital issue. Certificateless cryptography is one of the recent paradigms to provide security.
Gaurav Sharma, Suman Bala, Anil K. Verma
doaj +1 more source
Identity based cryptography from bilinear pairings [PDF]
This report contains an overview of two related areas of research in cryptography which have been prolific in significant advances in recent years. The first of these areas is pairing based cryptography.
Barbosa, Manuel
core
New Directions in Multivariate Public Key Cryptography [PDF]
Most public key cryptosystems used in practice are based on integer factorization or discrete logarithms (in finite fields or elliptic curves). However, these systems suffer from two potential drawbacks.
Heindl, Raymond
core +1 more source
Cryptography: Classical versus Post-Quantum [PDF]
The advantages of post-quantum cryptography over classical cryptography are covered in this survey. We address several post-quantum cryptography techniques. We conclude that the deployment of quantum-safe cryptographic systems is anticipated to be the future of secure communication, and that the development of post-quantum cryptography is essential to ...
arxiv
Trusted Certificates in Quantum Cryptography [PDF]
This paper analyzes the performance of Kak's three stage quantum cryptographic protocol based on public key cryptography against a man-in-the-middle attack. A method for protecting against such an attack is presented using certificates distributed by a trusted third party.
arxiv
Tensor-based trapdoors for CVP and their application to public key cryptography [PDF]
We propose two trapdoors for the Closest-Vector-Problem in lattices (CVP) related to the lattice tensor product.
Fischlin, Roger, Seifert, Jean-Pierre
core +1 more source
RSA: Dagli anni '70 al giorno d'oggi
In this note, after a brief historical excursus, we describe the revolution in cryptography of the 70es, due to the introduction of public key cryptography and the RSA algorithm. We also consider some contemporary applications of this algorithm.
Pellegrini, S
doaj +1 more source
Implementing the Three-Stage Quantum Cryptography Protocol [PDF]
We present simple implementations of Kak's three-stage quantum cryptography protocol. The case where the transformation is applied to more than one qubit at the same time is also considered.
arxiv
High-Performance NTRU Accelerator Using a Direct Memory Access Controller
NTRU is a well-established and widely used public-key cryptography. It has been standardized in IEEE Std1363.1 and X9.98, and its variant was submitted to the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC ...
Seon Bhin Kim+2 more
doaj +1 more source
Full Restoration of Visual Encrypted Color Images [PDF]
While strictly black and white images have been the basis for visual cryptography, there has been a lack of an easily implemented format for colour images. This paper establishes a simple, yet secure way of implementing visual cryptography with colour, assuming a binary data representation.
arxiv