Results 281 to 290 of about 511,689 (360)
Post-Quantum Linkable Hash-Based Ring Signature Scheme for Off-Chain Payments in IoT. [PDF]
He L, Zhou X, Cai D, Hu X, Liu S.
europepmc +1 more source
Efficient Post-Quantum Cryptography Algorithms for Auto-Enrollment in Public Key Infrastructure
Rehab Al-Dabbagh +2 more
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2002
The basic idea of public-key cryptography are public keys. Each person’s key is separated into two parts: a public key for encryption available to everyone and a secret key for decryption which is kept secret by the owner. In this chapter we introduce the concept of public-key cryptography.
Helmut Knebl, Hans Delfs
semanticscholar +5 more sources
The basic idea of public-key cryptography are public keys. Each person’s key is separated into two parts: a public key for encryption available to everyone and a secret key for decryption which is kept secret by the owner. In this chapter we introduce the concept of public-key cryptography.
Helmut Knebl, Hans Delfs
semanticscholar +5 more sources
2021
In this chapter we will discuss public-key cryptography(PKC) and it’s various applications and its probable use. Limitations and disadvantages of symmetric-key cryptography(private-key cryptography) motivates the extensive use of public-key cryptography. Well known limitations are: Key exchange is a major problem in symmetric key cryptography. you
Satyanarayana Vollala +2 more
openaire +2 more sources
In this chapter we will discuss public-key cryptography(PKC) and it’s various applications and its probable use. Limitations and disadvantages of symmetric-key cryptography(private-key cryptography) motivates the extensive use of public-key cryptography. Well known limitations are: Key exchange is a major problem in symmetric key cryptography. you
Satyanarayana Vollala +2 more
openaire +2 more sources
In this chapter, we will explore some computational aspects of modular arithmetic, which we studied in Chapter 6. We will be concerned about how to compute certain numbers in a most efficient way. There is a whole field at work here, of which we barely scratch the surface, called computational complexity.
Matthias Beck, Ross Geoghegan
openaire +3 more sources
2006
Non-secret encryption Until relatively recently cryptosystems were always symmetric. They relied on the use of a shared secret key known to both sender and receiver. This all changed in the 1970s. Public key cryptosystems, as they are now called, revolutionised the theory and practice of cryptography by relying for their impenetrability on the ...
John Talbot, Dominic Welsh
openaire +3 more sources
Non-secret encryption Until relatively recently cryptosystems were always symmetric. They relied on the use of a shared secret key known to both sender and receiver. This all changed in the 1970s. Public key cryptosystems, as they are now called, revolutionised the theory and practice of cryptography by relying for their impenetrability on the ...
John Talbot, Dominic Welsh
openaire +3 more sources
Session-Key Establishment and Authentication in a Smart Home Network Using Public Key Cryptography
IEEE Sensors Letters, 2019The development of the applications of Internet of Things (IoT) technology continues to grow steadily—one of the top applications being smart home environments.
Shreya Dey, A. Hossain
semanticscholar +1 more source
IEEE Transactions on Emerging Topics in Computing, 2023
Advances in quantum computing have brought the need for developing public-key cryptosystems secure against attacks potentially enabled by quantum computers.
Alvaro Cintas Canto +4 more
semanticscholar +1 more source
Advances in quantum computing have brought the need for developing public-key cryptosystems secure against attacks potentially enabled by quantum computers.
Alvaro Cintas Canto +4 more
semanticscholar +1 more source
AT&T Technical Journal, 1994
This article explains public key cryptography, its benefits and limitations.
openaire +2 more sources
This article explains public key cryptography, its benefits and limitations.
openaire +2 more sources

