Results 101 to 110 of about 835,298 (263)

Security Algorithms for Cloud Computing Environment [PDF]

open access: yesarXiv, 2015
In symmetric key cryptography the sender as well as the receiver possess a common key. Asymmetric key cryptography involves generation of two distinct keys which are used for encryption and decryption correspondingly. The sender converts the original message to cipher text using the public key while the receiver can decipher this using his private key.
arxiv  

Hardware architectures for public key cryptography [PDF]

open access: green, 2003
Lejla Batina   +3 more
openalex   +1 more source

Electronic Voting Protocol Using Identity-Based Cryptography

open access: yesThe Scientific World Journal, 2015
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms.
Gina Gallegos-Garcia   +1 more
doaj   +1 more source

Review of Lattice-based Public key Cryptography(Russian) [PDF]

open access: yesarXiv, 2010
This article presets a review of the achievements rapidly developing field of cryptography - public-key cryptography based on the lattice theory. Paper contains the necessary basic concepts and the major problems of the lattice theory, as well as together with the description on the benefits of this cryptography class - the properties of the ...
arxiv  

Key Exchange in the Quantum Era: Evaluating a Hybrid System of Public-Key Cryptography and Physical-Layer Security [PDF]

open access: yesarXiv
Today's information society relies on cryptography to achieve security goals such as confidentiality, integrity, authentication, and non-repudiation for digital communications. Here, public-key cryptosystems play a pivotal role to share encryption keys and create digital signatures. However, quantum computers threaten the security of traditional public-
arxiv  

Bit-oriented quantum public-key encryption [PDF]

open access: yesarXiv, 2015
We propose a bit-oriented quantum public-key scheme which uses Boolean function as private-key and randomly changed pairs of quantum state and classical string as public-keys. Contrast to the typical classical public-key scheme, one private-key in our scheme corresponds to an exponential number of public-keys.
arxiv  

Image Authentication using Visual Cryptography [PDF]

open access: yesarXiv, 2017
This report gives a novel technique of image encryption and authentication by combining elements of Visual Cryptography and Public Key Cryptography. A prominent attack involving generation of fake shares to cheat honest users has been described and a demonstration of the proposed system employing a centralised server to generate shares and authenticate
arxiv  

FPGA design for algebraic tori-based public-key cryptography [PDF]

open access: green, 2008
Junfeng Fan   +3 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy