Results 231 to 240 of about 810,634 (263)
Some of the next articles are maybe not open access.
A light-weight certificate-less public key cryptography scheme based on ECC
International Conference on Computer Communications and Networks, 2014With the rapid development of mobile computing, more and more mobile devices, such as smart phones and tablets are able to access Internet. As these mobile devices are usually battery powered, energy efficiency is a very important issue.
Xuanxia Yao, Xiaoguang Han, Xiaojiang Du
semanticscholar +1 more source
Energy analysis of public-key cryptography for wireless sensor networks
Third IEEE International Conference on Pervasive Computing and Communications, 2005In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit microcontroller platform. We present a comparison of two public-key algorithms, RSA and elliptic curve cryptography (ECC), and ...
A. Wander+4 more
semanticscholar +1 more source
Introduction to Public-Key Cryptography
2005In this chapter we introduce the basic building blocks for cryptography based on the discrete logarithm problem that will constitute the main motivation for considering the groups studied in this book. We also briefly introduce the RSA cryptosystem as for use in practice it is still an important public-key cryptosystem.
Roberto Avanzi, Tanja Lange
openaire +3 more sources
In modern day communication systems the conventional cryptosystems turned out to have two disturbing disadvantages.
openaire +1 more source
Securing M2M With Post-Quantum Public-Key Cryptography
IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 2013In this paper, we present an ASIC implementation of two post-quantum public-key cryptosystems (PKCs): NTRUEncrypt and TTS. It represents a first step toward securing machine-to-machine (M2M) systems using strong, hardware-assisted PKC. In contrast to the
Jie-Ren Shih+7 more
semanticscholar +1 more source
AT&T Technical Journal, 1994
The concern for secure communications has moved cryptology from an arcane science, best known to the military and diplomatic services, to an integral component for business and personal communications. Public key cryptography, developed within the last two decades for commercial use, has become an exciting technology for the communications industry, as
openaire +2 more sources
The concern for secure communications has moved cryptology from an arcane science, best known to the military and diplomatic services, to an integral component for business and personal communications. Public key cryptography, developed within the last two decades for commercial use, has become an exciting technology for the communications industry, as
openaire +2 more sources
Public key versus symmetric key cryptography in client–server authentication protocols
International Journal of Information Security, 2021An Braeken
semanticscholar +1 more source
2018
In this short chapter, we talk a bit about cryptography. First, we discuss some classical sorts of private key methods, and their limitations in the modern world. We then look at the first public key cryptographic method.
openaire +2 more sources
In this short chapter, we talk a bit about cryptography. First, we discuss some classical sorts of private key methods, and their limitations in the modern world. We then look at the first public key cryptographic method.
openaire +2 more sources
1999
Today’s widespread use of electronic networks in the economic world has raised cryptography from a speciality of the military and secret services to a topic of public interest, which concerns international organisations like the UNO ([UNCITRAL, 1998a] and [UNCITRAL, 1998b]) and the EU ([Commission of the European Communities, 1998]).
openaire +2 more sources
Today’s widespread use of electronic networks in the economic world has raised cryptography from a speciality of the military and secret services to a topic of public interest, which concerns international organisations like the UNO ([UNCITRAL, 1998a] and [UNCITRAL, 1998b]) and the EU ([Commission of the European Communities, 1998]).
openaire +2 more sources
Computer, 1996
The RSA algorithm can be used for a kind of unforgeable digital signature. In this application, the secret key is used to encrypt a message, which can then itself be decrypted by anyone possessing the public key. Digital signatures can play a role in many activities that do not require secrecy but require sender authentication and guaranteed message ...
openaire +2 more sources
The RSA algorithm can be used for a kind of unforgeable digital signature. In this application, the secret key is used to encrypt a message, which can then itself be decrypted by anyone possessing the public key. Digital signatures can play a role in many activities that do not require secrecy but require sender authentication and guaranteed message ...
openaire +2 more sources