Results 101 to 110 of about 835,298 (263)
Security Algorithms for Cloud Computing Environment [PDF]
In symmetric key cryptography the sender as well as the receiver possess a common key. Asymmetric key cryptography involves generation of two distinct keys which are used for encryption and decryption correspondingly. The sender converts the original message to cipher text using the public key while the receiver can decipher this using his private key.
arxiv
Hardware architectures for public key cryptography [PDF]
Lejla Batina+3 more
openalex +1 more source
Electronic Voting Protocol Using Identity-Based Cryptography
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms.
Gina Gallegos-Garcia+1 more
doaj +1 more source
Review of Lattice-based Public key Cryptography(Russian) [PDF]
This article presets a review of the achievements rapidly developing field of cryptography - public-key cryptography based on the lattice theory. Paper contains the necessary basic concepts and the major problems of the lattice theory, as well as together with the description on the benefits of this cryptography class - the properties of the ...
arxiv
A SECURE CHANNEL PROTOCOL FOR MULTI-APPLICATION SMART CARDS BASED ON PUBLIC KEY CRYPTOGRAPHY [PDF]
Konstantinos Markantonakis, Keith Mayes
openalex +1 more source
Key Exchange in the Quantum Era: Evaluating a Hybrid System of Public-Key Cryptography and Physical-Layer Security [PDF]
Today's information society relies on cryptography to achieve security goals such as confidentiality, integrity, authentication, and non-repudiation for digital communications. Here, public-key cryptosystems play a pivotal role to share encryption keys and create digital signatures. However, quantum computers threaten the security of traditional public-
arxiv
Bit-oriented quantum public-key encryption [PDF]
We propose a bit-oriented quantum public-key scheme which uses Boolean function as private-key and randomly changed pairs of quantum state and classical string as public-keys. Contrast to the typical classical public-key scheme, one private-key in our scheme corresponds to an exponential number of public-keys.
arxiv
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography [PDF]
David J. Malan+2 more
openalex +1 more source
Image Authentication using Visual Cryptography [PDF]
This report gives a novel technique of image encryption and authentication by combining elements of Visual Cryptography and Public Key Cryptography. A prominent attack involving generation of fake shares to cheat honest users has been described and a demonstration of the proposed system employing a centralised server to generate shares and authenticate
arxiv
FPGA design for algebraic tori-based public-key cryptography [PDF]
Junfeng Fan+3 more
openalex +2 more sources