Results 1 to 10 of about 425,604 (341)

Public-Key Cryptography Based on Tropical Circular Matrices [PDF]

open access: goldApplied Sciences, 2022
Some public-key cryptosystems based on the tropical semiring have been proposed in recent years because of their increased efficiency, since the multiplication is actually an ordinary addition of numbers and there is no ordinary multiplication of numbers
Huawei Huang, Chunhua Li, Lunzhi Deng
doaj   +3 more sources

Computational Thinking Enrichment: Public-Key Cryptography [PDF]

open access: diamondInformatics in Education, 2018
The Computer Science Unplugged activities and project has been an influential STEM (Science, Technology, Engineering & Mathematics) initiative, providing enrichment and teaching activities supporting computational thinking.
Frances ROSAMOND
doaj   +2 more sources

An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy

open access: yesSensors, 2022
The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications.
Shuhab Shamshad   +4 more
doaj   +2 more sources

Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status

open access: yesIEEE Access, 2021
The interconnected digital world is generating enormous data that must be secured from unauthorized access. Advancement in technologies and new innovative methods applied by attackers play an instrumental role in breaching data security.
Raza Imam   +3 more
doaj   +2 more sources

Public-key cryptography and invariant theory [PDF]

open access: greenJournal of Mathematical Sciences, 2005
Public-key cryptosystems are suggested based on invariants of groups. We give also an overview of the known cryptosystems which involve groups.
Dima Grigoriev
openaire   +6 more sources

Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures [PDF]

open access: goldIET Information Security, 2021
A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to ...
Foteini Baldimtsi   +2 more
doaj   +2 more sources

Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography

open access: yesIEEE Photonics Journal, 2019
On the basis of ghost imaging, this paper proposes a multiple-image encryption scheme combining public key cryptography and Hadamard basis pattern. In the encryption system, a plurality of light paths are set, and the Hadamard basis patterns are used for
Leihong Zhang   +3 more
doaj   +2 more sources

A Lightweight Certificateless Authenticated Key Agreement Scheme Based on Chebyshev Polynomials for the Internet of Drones [PDF]

open access: yesSensors
The Internet of Drones (IoD) overcomes the physical limitations of traditional ground networks with its dynamic topology and 3D spatial flexibility, playing a crucial role in various fields.
Zhaobin Li   +4 more
doaj   +2 more sources

Public key cryptography [PDF]

open access: bronzeXRDS: Crossroads, The ACM Magazine for Students, 2000
P. Mohapatra
openaire   +3 more sources

Quantum cryptography: Public key distribution and coin tossing [PDF]

open access: hybridTheoretical Computer Science, 2014
Charles H. Bennett, Gilles Brassard
openalex   +2 more sources

Home - About - Disclaimer - Privacy