Results 261 to 270 of about 85,961 (310)
A MARL-federated blockchain-based quantum secure framework for trust management in industrial internet of things. [PDF]
Alandjani G.
europepmc +1 more source
Subsets of groups in public-key cryptography
André Carvalho, António Malheiro
openalex +1 more source
Public-key cryptography architectures:performance and robustness evaluation
Guilherme Perin
openalex +1 more source
Linearity Measures for Multivariate Public Key Cryptography
Simona Samardjiska, Danilo Gligoroski
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2021
In this chapter we will discuss public-key cryptography(PKC) and it’s various applications and its probable use. Limitations and disadvantages of symmetric-key cryptography(private-key cryptography) motivates the extensive use of public-key cryptography. Well known limitations are: Key exchange is a major problem in symmetric key cryptography. you
Satyanarayana Vollala +2 more
openaire +1 more source
In this chapter we will discuss public-key cryptography(PKC) and it’s various applications and its probable use. Limitations and disadvantages of symmetric-key cryptography(private-key cryptography) motivates the extensive use of public-key cryptography. Well known limitations are: Key exchange is a major problem in symmetric key cryptography. you
Satyanarayana Vollala +2 more
openaire +1 more source
2005
Secure transmission of private information is a crucial issue in today’s highly computerized world. Cryptographic algorithms are used to provide privacy of message transmission and to certify authenticity of sender and/or receiver of a message and message integrity as well as undeniability of transmitted messages (Menezes et al., 1996).
+7 more sources
Secure transmission of private information is a crucial issue in today’s highly computerized world. Cryptographic algorithms are used to provide privacy of message transmission and to certify authenticity of sender and/or receiver of a message and message integrity as well as undeniability of transmitted messages (Menezes et al., 1996).
+7 more sources
Abstract The basic idea of public-key cryptography as a means for two untrusting parties to establish secure communication is outlined. The use of public-key cryptography to establish a key for a symmetric cryptosystem by using a protocol such as the Diffie-Hellman protocol or quantum key distribution (QKD) is explained. Two major public-
Eric L. F. Roettger, Hugh C. Williams
+4 more sources
Eric L. F. Roettger, Hugh C. Williams
+4 more sources

