Results 301 to 310 of about 511,689 (360)
Some of the next articles are maybe not open access.

Public Key Cryptography

2009
This chapter contains sections titled: Introduction This chapter contains sections titled: Cryptosystems and Cryptanalysis Key Management Digital Signatures and Hash Functions Examples of Public Key Systems and Hash Functions Implementations of Public Key Cryptography A Sample Proposal for a LAN ...
openaire   +2 more sources

Public Key Cryptography

1999
Today’s widespread use of electronic networks in the economic world has raised cryptography from a speciality of the military and secret services to a topic of public interest, which concerns international organisations like the UNO ([UNCITRAL, 1998a] and [UNCITRAL, 1998b]) and the EU ([Commission of the European Communities, 1998]).
openaire   +2 more sources

Public Key Cryptography

2018
In this short chapter, we talk a bit about cryptography. First, we discuss some classical sorts of private key methods, and their limitations in the modern world. We then look at the first public key cryptographic method.
openaire   +2 more sources

Public-Key Cryptography

2003
The problem of key distribution has been mentioned many times in this book. For many years it was strongly believed that this problem has no satisfactory solution, but in the 1970s, an ideal, simple solution was found and has since become the foundation upon which much of modern cryptography is based.
openaire   +2 more sources

Public Key Cryptography [PDF]

open access: possible, 2008
Yvan Saint-Aubin, Christiane Rousseau
openaire   +3 more sources

Secure Healthcare Framework Using Blockchain and Public Key Cryptography

Blockchain Cybersecurity, Trust and Privacy, 2020
Randhir Kumar, Rakesh Tripathi
semanticscholar   +1 more source

Public-Randomness in Public-Key Cryptography

1991
In this work we investigate the power of Public Randomness in the context of Public-key cryptosystems. We consider the Diffie-Hellman Public-key model in which an additional short random string is shared by all users. This, which we call Public-Key Public-Randomness (PKPR) model, is very powerful as we show that it supports simple non-interactive ...
Giuseppe Persiano, Alfredo De Santis
openaire   +2 more sources

Optical image encryption algorithm based on hyper-chaos and public-key cryptography

Optics and Laser Technology, 2020
Yujia Liu   +4 more
semanticscholar   +1 more source

A tutorial on public key cryptography

Computers & Security, 1982
Abstract Public key cryptography provides the means for establishing instantaneous, secure communication between any two persons or any two computers. The prior exchange of a secret quantity, called the cryptographic key, is not necessary. In this paper, the underlying mathematical principles of public key (PK) cryptography are informally introduced ...
openaire   +2 more sources

Public Key Cryptography in Action

Information Systems Security, 1994
(1994). Public Key Cryptography in Action. Information Systems Security: Vol. 3, No. 1, pp. 57-70.
openaire   +2 more sources

Home - About - Disclaimer - Privacy