Results 11 to 20 of about 16,729,036 (330)

A New Attack on NTRU Public Key Cryptosystem Depend on Using Public Key and Public Information [PDF]

open access: yesEngineering and Technology Journal, 2010
This paper proposed a new method to attack the NTRU cryptosystem [Hof00a,Hof98b]. It tried to exploit the public information about the parameters of NTRUcryptosystem and using the public key, to recover the private keys without delvingin the detail of ...
Abdul Monem S.Rahma   +1 more
doaj   +1 more source

Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology

open access: yesNetworks and Heterogeneous Media, 2023
The central remote servers are essential for storing and processing data for cloud computing evaluation. However, traditional systems need to improve their ability to provide technical data security solutions.
Santosh Kumar Henge   +7 more
doaj   +1 more source

Blockchain Technology – Support for Collaborative Systems [PDF]

open access: yesInformatică economică, 2020
Blockchain technology is one of the most promising new technology, a new approach in data registration and distribution, and represents a new paradigm for how information is shared.
Gheorghe MATEI
doaj   +1 more source

Faster Bootstrapping With Multiple Addends

open access: yesIEEE Access, 2018
As an important cryptographic primitive in cloud computing and outsourced computing, fully homomorphic encryption (FHE) is an animated area in modern cryptography.
Tanping Zhou   +4 more
doaj   +1 more source

Smart Card-based Access Control System using Isolated Many-to-Many Authentication Scheme for Electric Vehicle Charging Stations

open access: yesJournal of ICT Research and Applications, 2023
In recent years, the Internet of Things (IoT) trend has been adopted very quickly. The rapid growth of IoT has increased the need for physical access control systems (ACS) for IoT devices, especially for IoT devices containing confidential data or other
Wervyan Shalannanda   +7 more
doaj   +1 more source

Public-Key Encryption with Delegated Search [PDF]

open access: yes, 2011
In public-key setting, Alice encrypts email with public key of Bob, so that only Bob will be able to learn contents of email. Consider scenario when computer of Alice is infected and unbeknown to Alice it also embeds malware into message.
Hartel, Pieter   +3 more
core   +3 more sources

A method for obtaining digital signatures and public-key cryptosystems

open access: yesCACM, 1978
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
R. Rivest, A. Shamir, L. Adleman
semanticscholar   +1 more source

Service for Verification of Electronic Document’s Certificates

open access: yesЦифровая трансформация, 2023
The legislation of the Republic of Belarus currently establishes the same legal force for identical documents on paper and in electronic form, which have a mandatory requisite - an electronic digital signature.
I. O. Tolokh   +2 more
doaj   +1 more source

Public Keys [PDF]

open access: yes, 2012
We performed a sanity check of public keys collected on the web and found that the vast majority works as intended. Our main goal was to test the validity of the assumption that different random choices are made each time keys are generated. We found that this is not always the case, resulting in public keys that offer no security.
Arjen K. Lenstra   +5 more
openaire   +1 more source

A Comparison on Broadcast Encryption Schemes: A New Broadcast Encryption Scheme

open access: yesAdvances in Electrical and Computer Engineering, 2020
In broadcast communication, the schemes in which encryption methods are employed are often used to transmit messages from a source to multiple users. There are three types of scheme categories: central, contributory and hybrid schemes.
BODUR, H., KARA, R.
doaj   +1 more source

Home - About - Disclaimer - Privacy