Results 21 to 30 of about 835,298 (263)

Lattice‐based cryptosystems in standardisation processes: A survey

open access: yesIET Information Security, 2023
The current widely used public‐key cryptosystems are vulnerable to quantum attacks. To prepare for cybersecurity in the quantum era, some projects have been launched to call for post‐quantum alternatives.
Anyu Wang, Dianyan Xiao, Yang Yu
doaj   +1 more source

Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status

open access: yesIEEE Access, 2021
The interconnected digital world is generating enormous data that must be secured from unauthorized access. Advancement in technologies and new innovative methods applied by attackers play an instrumental role in breaching data security.
Raza Imam   +3 more
doaj   +1 more source

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography

open access: yesIACR Cryptology ePrint Archive, 2020
. Unlike black-box cryptography, an adversary in a white-box security model has full access to the implementation of the cryptographic algorithm. Thus, white-box implementation of cryptographic algorithms is more practical. Nevertheless, in recent years,
Yudi Zhang   +4 more
semanticscholar   +1 more source

Lossless and Reversible Data Hiding using Public Key Cryptography [PDF]

open access: yesITM Web of Conferences, 2020
In today’s world, the internet is a platform, where large amount of data can be obtained and transferred. Different technologies and internet access are used to transfer the data which can be accessed by authorized and unauthorized users.The major ...
Shetye Pooja   +4 more
doaj   +1 more source

A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks

open access: yesIEEE Access, 2020
Certificateless public-key cryptography has conquered both the certificate management problem in the traditional public-key cryptography and the key escrow problem in the ID-based public-key cryptography. Certificateless authenticated key exchange (CLAKE)
Tsung-Che Hsieh   +2 more
doaj   +1 more source

A new code‐based digital signature based on the McEliece cryptosystem

open access: yesIET Communications, 2023
Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosystem. However, it is not
Farshid Haidary Makoui   +2 more
doaj   +1 more source

Efficient and Anonymous Certificateless Multi-Message and Multi-Receiver Signcryption Scheme Based on ECC

open access: yesIEEE Access, 2019
As the further extension of the multi-receiver signcryption, the multi-message and multi-receiver signcryption allows a sender to simultaneously signcrypt different messages for different receivers in only one logic operation, which makes it more ...
Liaojun Pang, Mengmeng Wei, Huixian Li
doaj   +1 more source

Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH

open access: yesIET Information Security, 2021
The supersingular isogeny Diffie–Hellman key exchange protocol (SIDH) was introduced by Jao and De Feo in 2011. SIDH operates on supersingular elliptic curves defined over Fp2, where p is a large prime number of the form p=4eA3eB−1 and eA and eB are ...
Daniel Cervantes‐Vázquez   +2 more
doaj   +1 more source

IMPROVING SMART GRID SECURITY USING MERKLE TREES [PDF]

open access: yes, 2014
—Presently nations worldwide are starting to convert their aging electrical power infrastructures into modern, dynamic power grids. Smart Grid offers much in the way of efficiencies and robustness to the electrical power grid, however its heavy reliance ...
Muñoz, Melesio Calderón
core   +2 more sources

Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles

open access: yesIEEE Access, 2019
The fast progression of the Internet of Vehicles (IoV) has resulted in a large number of vehicles connecting to networks. This leads to massive growth in the data collected from vehicles via IoV.
Rashad Elhabob   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy