Results 21 to 30 of about 84,134 (310)
Agri-Food Traceability Management using a RFID System with Privacy Protection [PDF]
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in food, an efficient tracking and tracing system is required.
Bernardi, Paolo +5 more
core +2 more sources
07381 Executive Summary - Cryptography [PDF]
The topics covered in the seminar spanned most areas of cryptography, in one way or another, both in terms of the types of schemes (public-key cryptography, symmetric cryptography, hash functions and other cryptographic functions, multi-party protocols ...
+3 more
core +1 more source
A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to ...
Foteini Baldimtsi +2 more
doaj +1 more source
Homomorphic signcryption with public plaintext‐result checkability
Signcryption originally proposed by Zheng (CRYPTO′97) is a useful cryptographic primitive that provides strong confidentiality and integrity guarantees.
Shimin Li +3 more
doaj +1 more source
Towards an efficient LWE‐based fully homomorphic encryption scheme
The security of most early fully homomorphic encryption schemes was based on the hardness of the Learning with Errors (LWE) problem. These schemes were inefficient in terms of per gate computations and public‐key size.
Uddipana Dowerah +1 more
doaj +1 more source
Tensor-based trapdoors for CVP and their application to public key cryptography [PDF]
We propose two trapdoors for the Closest-Vector-Problem in lattices (CVP) related to the lattice tensor product.
Fischlin, Roger, Seifert, Jean-Pierre
core +2 more sources
Analysis of Elliptic Curve Cryptography (ECC) for Energy Efficiency in Wireless Sensor Networks
Rapid growth of wireless sensor networks (WSN) in recent times has resulted in greater security requirements. One of the primary concerns in wireless sensor networks is energy efficiency and security mechanisms are no different.
Zain Ul Abideen Tariq +2 more
doaj +1 more source
Dynamic Cryptography Integrated Secured Decentralized Applications with Blockchain Programming
Blocks and chains are the building blocks of the blockchain, which is a community network. Blocks and chains are two terms used to describe collections of data information.
Jamal Kh-Madhloom
doaj +1 more source
IMPROVING SMART GRID SECURITY USING MERKLE TREES [PDF]
—Presently nations worldwide are starting to convert their aging electrical power infrastructures into modern, dynamic power grids. Smart Grid offers much in the way of efficiencies and robustness to the electrical power grid, however its heavy reliance ...
Muñoz, Melesio Calderón
core +2 more sources
Quantum‐resistant anonymous identity‐based encryption with trable identities
Identity‐based encryption (IBE), introduced by Shamir, eliminates the need for public‐key infrastructure. The sender can simply encrypt a message by using the recipient's identity (such as email or IP address) without needing to look up the public key ...
Zi‐Yuan Liu +4 more
doaj +1 more source

