Results 231 to 240 of about 810,634 (263)
Some of the next articles are maybe not open access.

A light-weight certificate-less public key cryptography scheme based on ECC

International Conference on Computer Communications and Networks, 2014
With the rapid development of mobile computing, more and more mobile devices, such as smart phones and tablets are able to access Internet. As these mobile devices are usually battery powered, energy efficiency is a very important issue.
Xuanxia Yao, Xiaoguang Han, Xiaojiang Du
semanticscholar   +1 more source

Energy analysis of public-key cryptography for wireless sensor networks

Third IEEE International Conference on Pervasive Computing and Communications, 2005
In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit microcontroller platform. We present a comparison of two public-key algorithms, RSA and elliptic curve cryptography (ECC), and ...
A. Wander   +4 more
semanticscholar   +1 more source

Introduction to Public-Key Cryptography

2005
In this chapter we introduce the basic building blocks for cryptography based on the discrete logarithm problem that will constitute the main motivation for considering the groups studied in this book. We also briefly introduce the RSA cryptosystem as for use in practice it is still an important public-key cryptosystem.
Roberto Avanzi, Tanja Lange
openaire   +3 more sources

Public Key Cryptography [PDF]

open access: possible, 1988
In modern day communication systems the conventional cryptosystems turned out to have two disturbing disadvantages.
openaire   +1 more source

Securing M2M With Post-Quantum Public-Key Cryptography

IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 2013
In this paper, we present an ASIC implementation of two post-quantum public-key cryptosystems (PKCs): NTRUEncrypt and TTS. It represents a first step toward securing machine-to-machine (M2M) systems using strong, hardware-assisted PKC. In contrast to the
Jie-Ren Shih   +7 more
semanticscholar   +1 more source

Public Key Cryptography

AT&T Technical Journal, 1994
The concern for secure communications has moved cryptology from an arcane science, best known to the military and diplomatic services, to an integral component for business and personal communications. Public key cryptography, developed within the last two decades for commercial use, has become an exciting technology for the communications industry, as
openaire   +2 more sources

Public Key Cryptography

2018
In this short chapter, we talk a bit about cryptography. First, we discuss some classical sorts of private key methods, and their limitations in the modern world. We then look at the first public key cryptographic method.
openaire   +2 more sources

Public Key Cryptography

1999
Today’s widespread use of electronic networks in the economic world has raised cryptography from a speciality of the military and secret services to a topic of public interest, which concerns international organisations like the UNO ([UNCITRAL, 1998a] and [UNCITRAL, 1998b]) and the EU ([Commission of the European Communities, 1998]).
openaire   +2 more sources

Public key cryptography

Computer, 1996
The RSA algorithm can be used for a kind of unforgeable digital signature. In this application, the secret key is used to encrypt a message, which can then itself be decrypted by anyone possessing the public key. Digital signatures can play a role in many activities that do not require secrecy but require sender authentication and guaranteed message ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy