Results 81 to 90 of about 116,815 (231)

On the Security of Certificateless Signature Schemes

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Wireless Sensor Network (WSN) has proved its presence in various real time applications and hence the security of such embedded devices is a vital issue. Certificateless cryptography is one of the recent paradigms to provide security.
Gaurav Sharma, Suman Bala, Anil K. Verma
doaj   +1 more source

Identity based cryptography from bilinear pairings [PDF]

open access: yes, 2005
This report contains an overview of two related areas of research in cryptography which have been prolific in significant advances in recent years. The first of these areas is pairing based cryptography.
Barbosa, Manuel
core  

New Directions in Multivariate Public Key Cryptography [PDF]

open access: yes, 2009
Most public key cryptosystems used in practice are based on integer factorization or discrete logarithms (in finite fields or elliptic curves). However, these systems suffer from two potential drawbacks.
Heindl, Raymond
core   +1 more source

Cryptography: Classical versus Post-Quantum [PDF]

open access: yesarXiv
The advantages of post-quantum cryptography over classical cryptography are covered in this survey. We address several post-quantum cryptography techniques. We conclude that the deployment of quantum-safe cryptographic systems is anticipated to be the future of secure communication, and that the development of post-quantum cryptography is essential to ...
arxiv  

Trusted Certificates in Quantum Cryptography [PDF]

open access: yesarXiv, 2006
This paper analyzes the performance of Kak's three stage quantum cryptographic protocol based on public key cryptography against a man-in-the-middle attack. A method for protecting against such an attack is presented using certificates distributed by a trusted third party.
arxiv  

Tensor-based trapdoors for CVP and their application to public key cryptography [PDF]

open access: yes, 2000
We propose two trapdoors for the Closest-Vector-Problem in lattices (CVP) related to the lattice tensor product.
Fischlin, Roger, Seifert, Jean-Pierre
core   +1 more source

RSA: Dagli anni '70 al giorno d'oggi

open access: yesAtti della Accademia Peloritana dei Pericolanti : Classe di Scienze Fisiche, Matematiche e Naturali, 2006
In this note, after a brief historical excursus, we describe the revolution in cryptography of the 70es, due to the introduction of public key cryptography and the RSA algorithm. We also consider some contemporary applications of this algorithm.
Pellegrini, S
doaj   +1 more source

Implementing the Three-Stage Quantum Cryptography Protocol [PDF]

open access: yesarXiv, 2006
We present simple implementations of Kak's three-stage quantum cryptography protocol. The case where the transformation is applied to more than one qubit at the same time is also considered.
arxiv  

High-Performance NTRU Accelerator Using a Direct Memory Access Controller

open access: yesIEEE Access
NTRU is a well-established and widely used public-key cryptography. It has been standardized in IEEE Std1363.1 and X9.98, and its variant was submitted to the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC ...
Seon Bhin Kim   +2 more
doaj   +1 more source

Full Restoration of Visual Encrypted Color Images [PDF]

open access: yesarXiv, 2011
While strictly black and white images have been the basis for visual cryptography, there has been a lack of an easily implemented format for colour images. This paper establishes a simple, yet secure way of implementing visual cryptography with colour, assuming a binary data representation.
arxiv  

Home - About - Disclaimer - Privacy