Results 21 to 30 of about 80,772 (303)
The interconnected digital world is generating enormous data that must be secured from unauthorized access. Advancement in technologies and new innovative methods applied by attackers play an instrumental role in breaching data security.
Raza Imam+3 more
doaj +1 more source
The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications.
Shuhab Shamshad+4 more
doaj +1 more source
Lossless and Reversible Data Hiding using Public Key Cryptography [PDF]
In today’s world, the internet is a platform, where large amount of data can be obtained and transferred. Different technologies and internet access are used to transfer the data which can be accessed by authorized and unauthorized users.The major ...
Shetye Pooja+4 more
doaj +1 more source
Certificateless public-key cryptography has conquered both the certificate management problem in the traditional public-key cryptography and the key escrow problem in the ID-based public-key cryptography. Certificateless authenticated key exchange (CLAKE)
Tsung-Che Hsieh+2 more
doaj +1 more source
A Lightweight Certificateless Authenticated Key Agreement Scheme Based on Chebyshev Polynomials for the Internet of Drones. [PDF]
The Internet of Drones (IoD) overcomes the physical limitations of traditional ground networks with its dynamic topology and 3D spatial flexibility, playing a crucial role in various fields.
Li Z, Ju Z, Zhao H, Wei Z, Lan G.
europepmc +2 more sources
A new code‐based digital signature based on the McEliece cryptosystem
Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosystem. However, it is not
Farshid Haidary Makoui+2 more
doaj +1 more source
As the further extension of the multi-receiver signcryption, the multi-message and multi-receiver signcryption allows a sender to simultaneously signcrypt different messages for different receivers in only one logic operation, which makes it more ...
Liaojun Pang, Mengmeng Wei, Huixian Li
doaj +1 more source
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
The supersingular isogeny Diffie–Hellman key exchange protocol (SIDH) was introduced by Jao and De Feo in 2011. SIDH operates on supersingular elliptic curves defined over Fp2, where p is a large prime number of the form p=4eA3eB−1 and eA and eB are ...
Daniel Cervantes‐Vázquez+2 more
doaj +1 more source
Probability theory and public-key cryptography [PDF]
In this short note, we address a common misconception at the interface of probability theory and public-key cryptography.
Bessonov, Mariya+2 more
openaire +3 more sources
Homomorphic signcryption with public plaintext‐result checkability
Signcryption originally proposed by Zheng (CRYPTO′97) is a useful cryptographic primitive that provides strong confidentiality and integrity guarantees.
Shimin Li+3 more
doaj +1 more source