Results 211 to 220 of about 810,634 (263)

Public-key cryptography

open access: gold
Seán Murphy, Rachel Player
openalex   +1 more source

Public-Key Cryptography

2002
The basic idea of public-key cryptography are public keys. Each person’s key is separated into two parts: a public key for encryption available to everyone and a secret key for decryption which is kept secret by the owner. In this chapter we introduce the concept of public-key cryptography.
Helmut Knebl, Hans Delfs
semanticscholar   +5 more sources

The Complexity of Public-Key Cryptography

Tutorials on the Foundations of Cryptography, 2017
We survey the computational foundations for public-key cryptography. We discuss the computational assumptions that have been used as bases for publickey encryption schemes, and the types of evidence we have for the veracity of these assumptions.
B. Barak
openaire   +3 more sources

Public-Key Cryptography

EATCS Monographs on Theoretical Computer Science, 1990
A. Salomaa
openaire   +2 more sources

Public Key Cryptography

2021
In this chapter we will discuss public-key cryptography(PKC) and it’s various applications and its probable use. Limitations and disadvantages of symmetric-key cryptography(private-key cryptography) motivates the extensive use of public-key cryptography. Well known limitations are: Key exchange is a major problem in symmetric key cryptography. you
Satyanarayana Vollala   +2 more
openaire   +2 more sources

Public-Key Cryptography [PDF]

open access: possible, 2010
In this chapter, we will explore some computational aspects of modular arithmetic, which we studied in Chapter 6. We will be concerned about how to compute certain numbers in a most efficient way. There is a whole field at work here, of which we barely scratch the surface, called computational complexity.
Matthias Beck, Ross Geoghegan
openaire   +3 more sources

Home - About - Disclaimer - Privacy