Results 221 to 230 of about 810,634 (263)
Some of the next articles are maybe not open access.
2006
Non-secret encryption Until relatively recently cryptosystems were always symmetric. They relied on the use of a shared secret key known to both sender and receiver. This all changed in the 1970s. Public key cryptosystems, as they are now called, revolutionised the theory and practice of cryptography by relying for their impenetrability on the ...
John Talbot, Dominic Welsh
openaire +3 more sources
Non-secret encryption Until relatively recently cryptosystems were always symmetric. They relied on the use of a shared secret key known to both sender and receiver. This all changed in the 1970s. Public key cryptosystems, as they are now called, revolutionised the theory and practice of cryptography by relying for their impenetrability on the ...
John Talbot, Dominic Welsh
openaire +3 more sources
Session-Key Establishment and Authentication in a Smart Home Network Using Public Key Cryptography
IEEE Sensors Letters, 2019The development of the applications of Internet of Things (IoT) technology continues to grow steadily—one of the top applications being smart home environments.
Shreya Dey, A. Hossain
semanticscholar +1 more source
IEEE Transactions on Emerging Topics in Computing, 2023
Advances in quantum computing have brought the need for developing public-key cryptosystems secure against attacks potentially enabled by quantum computers.
Alvaro Cintas Canto+4 more
semanticscholar +1 more source
Advances in quantum computing have brought the need for developing public-key cryptosystems secure against attacks potentially enabled by quantum computers.
Alvaro Cintas Canto+4 more
semanticscholar +1 more source
IEEE Transactions on Information Forensics and Security, 2016
Rapid advances in wireless communication technologies have paved the way for a wide range of mobile devices to become increasingly ubiquitous and popular. Mobile devices enable anytime, anywhere access to the Internet.
De-biao He+3 more
semanticscholar +1 more source
Rapid advances in wireless communication technologies have paved the way for a wide range of mobile devices to become increasingly ubiquitous and popular. Mobile devices enable anytime, anywhere access to the Internet.
De-biao He+3 more
semanticscholar +1 more source
A Survey on Post-Quantum Public-Key Signature Schemes for Secure Vehicular Communications
IEEE transactions on intelligent transportation systems (Print), 2022Basic security requirements such as confidentiality, user authentication and data integrity, are assured by using public-key cryptography (PKC). In particular, public-key signature schemes provide non-repudiation, integrity of transmitted messages and ...
Kyung-Ah Shim
semanticscholar +1 more source
2005
Secure transmission of private information is a crucial issue in today’s highly computerized world. Cryptographic algorithms are used to provide privacy of message transmission and to certify authenticity of sender and/or receiver of a message and message integrity as well as undeniability of transmitted messages (Menezes et al., 1996).
Paul Garrett, Daniel Lieman
openaire +4 more sources
Secure transmission of private information is a crucial issue in today’s highly computerized world. Cryptographic algorithms are used to provide privacy of message transmission and to certify authenticity of sender and/or receiver of a message and message integrity as well as undeniability of transmitted messages (Menezes et al., 1996).
Paul Garrett, Daniel Lieman
openaire +4 more sources
Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography
IEEE transactions on circuits and systems for video technology (Print), 2016This paper proposes lossless, reversible, and combined data hiding schemes for ciphertext images encrypted by public-key cryptosystems with probabilistic and homomorphic properties.
Xinpeng Zhang+3 more
semanticscholar +1 more source
Image encryption and decryption in public key cryptography based on MR
International Conference on Computing and Convergence Technology, 2015In the past decade, image encryption is given much attention in research of information security and a lot of image encryption algorithms have been introduced. Due to some intrinsic features of images like bulk data capacity and high data redundancy, the
Hiral Rathod, M. S. Sisodia, A. N. Reddy
semanticscholar +1 more source
2011
This chapter presents an asymmetric approach to cryptography – it uses different keys for encryption and decryption. The key for encryption is announced publically so that everybody can encode a message. Only the owner of the matching secret key can decode the encrypted message.
Dirk Bongartz, Walter Unger
openaire +4 more sources
This chapter presents an asymmetric approach to cryptography – it uses different keys for encryption and decryption. The key for encryption is announced publically so that everybody can encode a message. Only the owner of the matching secret key can decode the encrypted message.
Dirk Bongartz, Walter Unger
openaire +4 more sources
Binary and prime field multiplication for public key cryptography on embedded microprocessors
Secur. Commun. Networks, 2014Embedded microprocessors are used in a wide variety of platforms, including Radio frequency identification RFID systems, sensor networks, and smartphones.
Hwajeong Seo+4 more
semanticscholar +1 more source