Results 251 to 260 of about 810,634 (263)
Some of the next articles are maybe not open access.
The Mathematics of Public-Key Cryptography
Scientific American, 1979The electronic communications systems that are proliferating throughout modern society offer speed, accuracy and ever diminishing cost. They also present serious problems of security. As the ordinary transactions cond ucted in person, on the telephone or by written co respondence have come increasingly to be conducted by new kinds of electronic systems
openaire +2 more sources
Public-Key Cryptography and Availability
2005When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security guarantees of this technology are based on a particular model of computation.
Tage Stabell-Kulø, Simone Lupetti
openaire +2 more sources
Introduction to Public-Key Cryptography [PDF]
Cryptography was once considered to be a means of maintaining secrecy of communications only in military affairs and diplomacy. However, today, modern cryptography is used for various purposes in familiar circumstances. Public-key cryptography is a key technology of modern society; it is used for personal authentication, electronic commerce on the ...
openaire +1 more source
Encrypted image-based reversible data hiding with public key cryptography from difference expansion
Signal processing. Image communication, 2015Chih-Wei Shiu, Yu-Chi Chen, Wien Hong
semanticscholar +1 more source
Dual Isogenies and Their Application to Public-key Compression for Isogeny-based Cryptography
IACR Cryptology ePrint Archive, 2019M. Naehrig, Joost Renes
semanticscholar +1 more source
Implementing public-key cryptography on passive RFID tags is practical
International Journal of Information Security, 2014Alex Arbit+3 more
semanticscholar +1 more source
Public-Key Cryptography – PKC 2013
Lecture Notes in Computer Science, 2013K. Kurosawa, Goichiro Hanaoka
semanticscholar +1 more source
Public Key Cryptography – PKC 2012
Lecture Notes in Computer Science, 2012M. Fischlin, J. Buchmann, M. Manulis
semanticscholar +1 more source