Results 21 to 30 of about 507,576 (358)

A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks

open access: yesIEEE Access, 2020
Certificateless public-key cryptography has conquered both the certificate management problem in the traditional public-key cryptography and the key escrow problem in the ID-based public-key cryptography. Certificateless authenticated key exchange (CLAKE)
Tsung-Che Hsieh   +2 more
doaj   +1 more source

A new code‐based digital signature based on the McEliece cryptosystem

open access: yesIET Communications, 2023
Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosystem. However, it is not
Farshid Haidary Makoui   +2 more
doaj   +1 more source

Efficient and Anonymous Certificateless Multi-Message and Multi-Receiver Signcryption Scheme Based on ECC

open access: yesIEEE Access, 2019
As the further extension of the multi-receiver signcryption, the multi-message and multi-receiver signcryption allows a sender to simultaneously signcrypt different messages for different receivers in only one logic operation, which makes it more ...
Liaojun Pang, Mengmeng Wei, Huixian Li
doaj   +1 more source

Probability theory and public-key cryptography [PDF]

open access: yesInternational Journal of Computer Mathematics: Computer Systems Theory, 2020
In this short note, we address a common misconception at the interface of probability theory and public-key cryptography.
Bessonov, Mariya   +2 more
openaire   +3 more sources

Efficient public-key cryptography with bounded leakage and tamper resilience [PDF]

open access: yes, 2016
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks.
A Faonio   +46 more
core   +2 more sources

Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH

open access: yesIET Information Security, 2021
The supersingular isogeny Diffie–Hellman key exchange protocol (SIDH) was introduced by Jao and De Feo in 2011. SIDH operates on supersingular elliptic curves defined over Fp2, where p is a large prime number of the form p=4eA3eB−1 and eA and eB are ...
Daniel Cervantes‐Vázquez   +2 more
doaj   +1 more source

Agri-Food Traceability Management using a RFID System with Privacy Protection [PDF]

open access: yes, 2007
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in food, an efficient tracking and tracing system is required.
Bernardi, Paolo   +5 more
core   +2 more sources

Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles

open access: yesIEEE Access, 2019
The fast progression of the Internet of Vehicles (IoV) has resulted in a large number of vehicles connecting to networks. This leads to massive growth in the data collected from vehicles via IoV.
Rashad Elhabob   +3 more
semanticscholar   +1 more source

The performance analysis of public key cryptography-based authentication

open access: yesEAI Endorsed Transactions on Security and Safety, 2018
Several Kerberos-based authentication techniques using public-key cryptography have been proposed. Public-key cryptography can be used to eliminate a single point failure problem in the Key Distribution Center (KDC) and achieve better scalability. Public
Kaiqi Xiong
doaj   +1 more source

07381 Executive Summary - Cryptography [PDF]

open access: yes, 2008
The topics covered in the seminar spanned most areas of cryptography, in one way or another, both in terms of the types of schemes (public-key cryptography, symmetric cryptography, hash functions and other cryptographic functions, multi-party protocols ...
  +3 more
core   +1 more source

Home - About - Disclaimer - Privacy