Results 241 to 250 of about 810,634 (263)
Some of the next articles are maybe not open access.

Research on Design Principles of Elliptic Curve Public Key Cryptography and Its Implementation

International Conference on Computer Science and Service System, 2012
The mathematical theories involved in public key cryptography generally include factors decomposition problem of large numbers and discrete logarithm problem in finite field.
B. Qing-hai   +3 more
semanticscholar   +1 more source

Public Key Cryptography

2009
This chapter contains sections titled: Introduction This chapter contains sections titled: Cryptosystems and Cryptanalysis Key Management Digital Signatures and Hash Functions Examples of Public Key Systems and Hash Functions Implementations of Public Key Cryptography A Sample Proposal for a LAN ...
openaire   +2 more sources

The Public Key Cryptography

2003
A cryptographic system consists of a one to one enciphering transformation f from a set \(\mathcal{P}\) of plaintext message units to a set \(\mathcal{C}\) of ciphertext message units. For example, for a fixed N- letter alphabet, identified with ℤ/Nℤ, consider the mapping f : \(\mathcal{P}\) = ℤ/Nℤ → 𝑪 = ℤ/Nℤ given by f(P) = \(\mathcal{C}\) ≡ aP + b ...
openaire   +2 more sources

Mathematics of Public Key Cryptography

, 2012
Public key cryptography is a major interdisciplinary subject with many real-world applications, such as digital signatures. A strong background in the mathematics underlying public key cryptography is essential for a deep understanding of the subject ...
S. Galbraith
semanticscholar   +1 more source

Secure Healthcare Framework Using Blockchain and Public Key Cryptography

Blockchain Cybersecurity, Trust and Privacy, 2020
Randhir Kumar, Rakesh Tripathi
semanticscholar   +1 more source

Optical image encryption algorithm based on hyper-chaos and public-key cryptography

Optics and Laser Technology, 2020
Yujia Liu   +4 more
semanticscholar   +1 more source

Public Key Cryptography [PDF]

open access: possible, 2008
Yvan Saint-Aubin, Christiane Rousseau
openaire   +3 more sources

Public-Randomness in Public-Key Cryptography

1991
In this work we investigate the power of Public Randomness in the context of Public-key cryptosystems. We consider the Diffie-Hellman Public-key model in which an additional short random string is shared by all users. This, which we call Public-Key Public-Randomness (PKPR) model, is very powerful as we show that it supports simple non-interactive ...
Giuseppe Persiano, Alfredo De Santis
openaire   +2 more sources

Public-Key Cryptography

2003
The problem of key distribution has been mentioned many times in this book. For many years it was strongly believed that this problem has no satisfactory solution, but in the 1970s, an ideal, simple solution was found and has since become the foundation upon which much of modern cryptography is based.
openaire   +2 more sources

Public key cryptography

1993
This paper deals with public key cryptosystems and some of their applications such as password encryption and digital signatures. The necessary mathematical background is also provided.
openaire   +2 more sources

Home - About - Disclaimer - Privacy