Results 261 to 270 of about 16,729,036 (330)
Some of the next articles are maybe not open access.

Public-key authenticated encryption with keyword search revisited: Security model and constructions

Information Sciences, 2020
Baodong Qin   +4 more
semanticscholar   +1 more source

Public-Key Encryption

2012
The preceding chapter offered a brief glimpse at the origins of public-key cryptography, which was born with the purpose of enabling secure communication between two parties that do not have to share a common secret key. Public-key cryptography started with the realization that it should be possible to design encryption schemes in which it is ...
openaire   +1 more source

Public Key Encryption with Equality Test in the Standard Model

IACR Cryptology ePrint Archive, 2020
H. Lee   +4 more
semanticscholar   +1 more source

Public-Key Cryptosystems

2003
In 1976 Diffie and Hellman [152] described the framework for public-key cryptography. It was not until 1978 that three designs for public-key cryptosystems were published. Rivest, Shamir, and Adleman [431] showed how the discrete logarithm and factorization problems could be used to construct a public-key cryptosystem.
Josef Pieprzyk   +2 more
openaire   +1 more source

Public Key Cryptosystems

1986
It was only recently that public key cryptography developed into a precise mathematical subject, mainly as a response to the growing need for secure transmission of information via the electronic media. The main new idea was to base the security of cryptosystems on the intractability of number theory problems.
openaire   +1 more source

Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things

IEEE Transactions on Industrial Informatics, 2018
Mimi Ma   +4 more
semanticscholar   +1 more source

Cancer treatment and survivorship statistics, 2022

Ca-A Cancer Journal for Clinicians, 2022
Kimberly D Miller   +2 more
exaly  

NTRU: A Ring-Based Public Key Cryptosystem

International Workshop on Ant Colony Optimization and Swarm Intelligence, 1998
J. Hoffstein, J. Pipher, J. Silverman
semanticscholar   +1 more source

Public Key Infrastructure

CompTIA Security+ Certification Study Guide, 2020
A. Sheikh
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy