Results 1 to 10 of about 810,634 (263)
Some of the next articles are maybe not open access.

Introduction to Public-Key Cryptography

2010
Before we learn about the basics of public-key cryptography, let us recall that the term public-key cryptography is used interchangeably with asymmetric cryptography; they both denote exactly the same thing and are used synonymously.
Jan Pelzl, Christof Paar
openaire   +2 more sources

Certificates and Public Key Cryptography

2011
We concluded the previous chapter by describing the standard way of enabling HTTPS on an Apache web server. Our main goal was to protect the information exchanged between clients and the server from adversaries eavesdropping on communication. In this chapter, we will brush up on public key cryptography and examine its use in more detail.
David Basin   +2 more
openaire   +2 more sources

A tutorial on public key cryptography

Computers & Security, 1982
Abstract Public key cryptography provides the means for establishing instantaneous, secure communication between any two persons or any two computers. The prior exchange of a secret quantity, called the cryptographic key, is not necessary. In this paper, the underlying mathematical principles of public key (PK) cryptography are informally introduced ...
openaire   +2 more sources

An efficient certificateless public key cryptography with authorized equality test in IIoT

Journal of Ambient Intelligence and Humanized Computing, 2019
Rashad Elhabob   +3 more
semanticscholar   +1 more source

Secure limitation analysis of public-key cryptography for smart card settings

World wide web (Bussum), 2019
Youliang Tian   +3 more
semanticscholar   +1 more source

Applications to Public Key Cryptography

2016
In this chapter we describe, at an elementary level, some of the applications of the Group Theory and Number Theory we have developed so far to Cryptology. We emphasise that these “textbook versions” of the applications do not do justice to the complexities that arise in practice, and warn the reader that implementing the mechanisms that we discuss in ...
openaire   +2 more sources

Public Key Cryptography in Action

Information Systems Security, 1994
(1994). Public Key Cryptography in Action. Information Systems Security: Vol. 3, No. 1, pp. 57-70.
openaire   +2 more sources

Public-Key Cryptography in the Fine-Grained Setting

IACR Cryptology ePrint Archive, 2019
Rio LaVigne   +2 more
semanticscholar   +1 more source

Introduction to Public Key Cryptography

1993
We begin with an introduction to private and public key cryptography, and then proceed to introduce elliptic curve cryptosystems.
openaire   +2 more sources

Home - About - Disclaimer - Privacy