Results 1 to 10 of about 810,634 (263)
Some of the next articles are maybe not open access.
Introduction to Public-Key Cryptography
2010Before we learn about the basics of public-key cryptography, let us recall that the term public-key cryptography is used interchangeably with asymmetric cryptography; they both denote exactly the same thing and are used synonymously.
Jan Pelzl, Christof Paar
openaire +2 more sources
Certificates and Public Key Cryptography
2011We concluded the previous chapter by describing the standard way of enabling HTTPS on an Apache web server. Our main goal was to protect the information exchanged between clients and the server from adversaries eavesdropping on communication. In this chapter, we will brush up on public key cryptography and examine its use in more detail.
David Basin+2 more
openaire +2 more sources
Journal of Network and Computer Applications, 2019
Bidi Ying, A. Nayak
semanticscholar +1 more source
Bidi Ying, A. Nayak
semanticscholar +1 more source
A tutorial on public key cryptography
Computers & Security, 1982Abstract Public key cryptography provides the means for establishing instantaneous, secure communication between any two persons or any two computers. The prior exchange of a secret quantity, called the cryptographic key, is not necessary. In this paper, the underlying mathematical principles of public key (PK) cryptography are informally introduced ...
openaire +2 more sources
An efficient certificateless public key cryptography with authorized equality test in IIoT
Journal of Ambient Intelligence and Humanized Computing, 2019Rashad Elhabob+3 more
semanticscholar +1 more source
Secure limitation analysis of public-key cryptography for smart card settings
World wide web (Bussum), 2019Youliang Tian+3 more
semanticscholar +1 more source
Applications to Public Key Cryptography
2016In this chapter we describe, at an elementary level, some of the applications of the Group Theory and Number Theory we have developed so far to Cryptology. We emphasise that these “textbook versions” of the applications do not do justice to the complexities that arise in practice, and warn the reader that implementing the mechanisms that we discuss in ...
openaire +2 more sources
Public Key Cryptography in Action
Information Systems Security, 1994(1994). Public Key Cryptography in Action. Information Systems Security: Vol. 3, No. 1, pp. 57-70.
openaire +2 more sources
Public-Key Cryptography in the Fine-Grained Setting
IACR Cryptology ePrint Archive, 2019Rio LaVigne+2 more
semanticscholar +1 more source
Introduction to Public Key Cryptography
1993We begin with an introduction to private and public key cryptography, and then proceed to introduce elliptic curve cryptosystems.
openaire +2 more sources