Results 211 to 220 of about 810,634 (263)
Distributed blockchain assisted secure data aggregation scheme for risk-aware zone-based MANET. [PDF]
Sugumaran VR+3 more
europepmc +1 more source
A secure and scalable IoT access control framework with dynamic attribute updates and policy hiding. [PDF]
Xu Z+5 more
europepmc +1 more source
A secure transaction and smart contract architecture for internet of vehicles. [PDF]
Lin HY.
europepmc +1 more source
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms. [PDF]
Singh P, Pranav P, Dutta S.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2002
The basic idea of public-key cryptography are public keys. Each person’s key is separated into two parts: a public key for encryption available to everyone and a secret key for decryption which is kept secret by the owner. In this chapter we introduce the concept of public-key cryptography.
Helmut Knebl, Hans Delfs
semanticscholar +5 more sources
The basic idea of public-key cryptography are public keys. Each person’s key is separated into two parts: a public key for encryption available to everyone and a secret key for decryption which is kept secret by the owner. In this chapter we introduce the concept of public-key cryptography.
Helmut Knebl, Hans Delfs
semanticscholar +5 more sources
The Complexity of Public-Key Cryptography
Tutorials on the Foundations of Cryptography, 2017We survey the computational foundations for public-key cryptography. We discuss the computational assumptions that have been used as bases for publickey encryption schemes, and the types of evidence we have for the veracity of these assumptions.
B. Barak
openaire +3 more sources
2021
In this chapter we will discuss public-key cryptography(PKC) and it’s various applications and its probable use. Limitations and disadvantages of symmetric-key cryptography(private-key cryptography) motivates the extensive use of public-key cryptography. Well known limitations are: Key exchange is a major problem in symmetric key cryptography. you
Satyanarayana Vollala+2 more
openaire +2 more sources
In this chapter we will discuss public-key cryptography(PKC) and it’s various applications and its probable use. Limitations and disadvantages of symmetric-key cryptography(private-key cryptography) motivates the extensive use of public-key cryptography. Well known limitations are: Key exchange is a major problem in symmetric key cryptography. you
Satyanarayana Vollala+2 more
openaire +2 more sources
In this chapter, we will explore some computational aspects of modular arithmetic, which we studied in Chapter 6. We will be concerned about how to compute certain numbers in a most efficient way. There is a whole field at work here, of which we barely scratch the surface, called computational complexity.
Matthias Beck, Ross Geoghegan
openaire +3 more sources