Results 261 to 270 of about 16,729,036 (330)
Some of the next articles are maybe not open access.
Public-key authenticated encryption with keyword search revisited: Security model and constructions
Information Sciences, 2020Baodong Qin +4 more
semanticscholar +1 more source
2012
The preceding chapter offered a brief glimpse at the origins of public-key cryptography, which was born with the purpose of enabling secure communication between two parties that do not have to share a common secret key. Public-key cryptography started with the realization that it should be possible to design encryption schemes in which it is ...
openaire +1 more source
The preceding chapter offered a brief glimpse at the origins of public-key cryptography, which was born with the purpose of enabling secure communication between two parties that do not have to share a common secret key. Public-key cryptography started with the realization that it should be possible to design encryption schemes in which it is ...
openaire +1 more source
Public Key Encryption with Equality Test in the Standard Model
IACR Cryptology ePrint Archive, 2020H. Lee +4 more
semanticscholar +1 more source
2003
In 1976 Diffie and Hellman [152] described the framework for public-key cryptography. It was not until 1978 that three designs for public-key cryptosystems were published. Rivest, Shamir, and Adleman [431] showed how the discrete logarithm and factorization problems could be used to construct a public-key cryptosystem.
Josef Pieprzyk +2 more
openaire +1 more source
In 1976 Diffie and Hellman [152] described the framework for public-key cryptography. It was not until 1978 that three designs for public-key cryptosystems were published. Rivest, Shamir, and Adleman [431] showed how the discrete logarithm and factorization problems could be used to construct a public-key cryptosystem.
Josef Pieprzyk +2 more
openaire +1 more source
1986
It was only recently that public key cryptography developed into a precise mathematical subject, mainly as a response to the growing need for secure transmission of information via the electronic media. The main new idea was to base the security of cryptosystems on the intractability of number theory problems.
openaire +1 more source
It was only recently that public key cryptography developed into a precise mathematical subject, mainly as a response to the growing need for secure transmission of information via the electronic media. The main new idea was to base the security of cryptosystems on the intractability of number theory problems.
openaire +1 more source
Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things
IEEE Transactions on Industrial Informatics, 2018Mimi Ma +4 more
semanticscholar +1 more source
Cancer treatment and survivorship statistics, 2022
Ca-A Cancer Journal for Clinicians, 2022Kimberly D Miller +2 more
exaly
NTRU: A Ring-Based Public Key Cryptosystem
International Workshop on Ant Colony Optimization and Swarm Intelligence, 1998J. Hoffstein, J. Pipher, J. Silverman
semanticscholar +1 more source
An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
Information Sciences, 2017Qiong Huang, Hongbo Li
semanticscholar +1 more source

