Results 31 to 40 of about 16,729,036 (330)

A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure

open access: yesIEEE Access, 2019
We analyze the security of RSA prime generation implemented on embedded devices by a practical power analysis attack. Unlike previous differential power analysis-based attack on primality tests of RSA prime generation exploiting the deterministic ...
Sangyub Lee   +3 more
doaj   +1 more source

Key-Insulated Public Key Cryptosystems [PDF]

open access: yes, 2002
Cryptographic computations (decryption, signature generation, etc.) are often performed on a relatively insecure device (e.g., a mobile device or an Internet-connected host) which cannot be trusted to maintain secrecy of the private key. We propose and investigate the notion of key-insulated security whose goal is to minimize the damage caused by ...
Yevgeniy Dodis   +3 more
openaire   +1 more source

New sequences from the generalized Pell p−numbers and mersenne numbers and their application in cryptography

open access: yesAIMS Mathematics
This paper presents the generalized Pell $ p- $numbers and provides some related results. A new sequence is defined using the characteristic polynomial of the Pell $ p- $numbers and generalized Mersenne numbers.
Elahe Mehraban   +4 more
doaj   +1 more source

Radio Frequency Public Key Generator for Digital Cryptographic Application

open access: yesIEEE Access, 2023
In Internet of Things (IoT) environments, effective public key management is crucial for managing numerous devices. RF features, primarily considered analog features within physical layer authentication by RF Fingerprinting (RFF) processes, present a ...
Jusung Kang, Young-Sik Kim, Heung-No Lee
doaj   +1 more source

Efficient public-key cryptography with bounded leakage and tamper resilience [PDF]

open access: yes, 2016
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks.
A Faonio   +46 more
core   +2 more sources

Integrating Digital Technologies and Public Health to Fight Covid-19 Pandemic: Key Technologies, Applications, Challenges and Outlook of Digital Healthcare

open access: yesInternational Journal of Environmental Research and Public Health, 2021
Integration of digital technologies and public health (or digital healthcare) helps us to fight the Coronavirus Disease 2019 (COVID-19) pandemic, which is the biggest public health crisis humanity has faced since the 1918 Influenza Pandemic.
Qiang Wang   +3 more
semanticscholar   +1 more source

Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization [PDF]

open access: yes, 2011
In this paper we investigate a category of public key encryption schemes which supports plaintext equality test and user-specified authorization. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a ...
Tang, Qiang
core   +5 more sources

A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things

open access: yesIEEE Access, 2019
The Internet of Things envisages connecting all physical objects or things to the Internet, using devices as diverse as smartphones, coffee makers, washing machines, automobiles, lamps, and wearable devices, among many others.
Manisha Malik, M. Dutta, J. Granjal
semanticscholar   +1 more source

Matrično zasnovan algoritam za skrivanje tekstova i obradu informacija

open access: yesVojnotehnički Glasnik, 2014
Primena diferencijalne geometrije u skrivanju tekstualnih podataka prikazana je u ovom radu. Ta primena predstavlja generalizaciju prethodno predstavljenih metoda. Matrično vrednosne funkcije više promenljivih korišćene su u ovom radu.
Nenad O. Vesić, Dušan J. Simjanović
doaj   +1 more source

A Lightweight Certificateless Group Key Agreement Method without Pairing Based on Blockchain for Smart Grid

open access: yesFuture Internet, 2022
In smart grids, the access verification of a large number of intelligent gateways and terminal devices has become one of the main concerns to ensure system security.
Zhihao Wang, Ru Huo, Shuo Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy