Results 241 to 250 of about 13,982 (300)
SILBE: An Updatable Public Key Encryption Scheme from Lollipop Attacks
Max Duparc +2 more
openalex +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2020
In 1976, Diffie and Hellman first introduced the concept of public-key cryptography. Unlike the traditional symmetric-key primitive, public-key primitive has a pair of keys, namely, public key and private key, where the public key can be made freely available to anyone with the guarantee that it is computationally infeasible to compute the private key ...
Jonathan Katz, Yehuda Lindell
openaire +2 more sources
In 1976, Diffie and Hellman first introduced the concept of public-key cryptography. Unlike the traditional symmetric-key primitive, public-key primitive has a pair of keys, namely, public key and private key, where the public key can be made freely available to anyone with the guarantee that it is computationally infeasible to compute the private key ...
Jonathan Katz, Yehuda Lindell
openaire +2 more sources
2011
I’m sure you’ve heard of public key encryption (PKE). You probably use it every day—if not in your code or on your servers, then on the Internet. When you use secure socket layers (SSL) in your browser or when you see the lock or key symbol and see https:(with the s) as the protocol in the address bar, you are using PKE and other encryption.
+5 more sources
I’m sure you’ve heard of public key encryption (PKE). You probably use it every day—if not in your code or on your servers, then on the Internet. When you use secure socket layers (SSL) in your browser or when you see the lock or key symbol and see https:(with the s) as the protocol in the address bar, you are using PKE and other encryption.
+5 more sources
1999
Public-key algorithms use a secret element and a public element to their code. One of the main algorithms is RSA. Compared with DES it is relatively slow but it has the advantage that users can choose their own key whenever they need one. The most commonly used public-key cryptosystems are covered in the next sections.
+4 more sources
Public-key algorithms use a secret element and a public element to their code. One of the main algorithms is RSA. Compared with DES it is relatively slow but it has the advantage that users can choose their own key whenever they need one. The most commonly used public-key cryptosystems are covered in the next sections.
+4 more sources
2012
The preceding chapter offered a brief glimpse at the origins of public-key cryptography, which was born with the purpose of enabling secure communication between two parties that do not have to share a common secret key. Public-key cryptography started with the realization that it should be possible to design encryption schemes in which it is ...
openaire +2 more sources
The preceding chapter offered a brief glimpse at the origins of public-key cryptography, which was born with the purpose of enabling secure communication between two parties that do not have to share a common secret key. Public-key cryptography started with the realization that it should be possible to design encryption schemes in which it is ...
openaire +2 more sources
ACM SIGSAM Bulletin, 1987
The RSA method is used for the interchange of secret messages via insecure channels. It is elegant in theory and fast and reliable in practice. Applications are in the field of communication networks.The method is initialized by choosing some suitable large prime numbers. Encrypting and decrypting of a message are done by modular arithmetic.
openaire +1 more source
The RSA method is used for the interchange of secret messages via insecure channels. It is elegant in theory and fast and reliable in practice. Applications are in the field of communication networks.The method is initialized by choosing some suitable large prime numbers. Encrypting and decrypting of a message are done by modular arithmetic.
openaire +1 more source

