Results 311 to 320 of about 511,689 (360)
Some of the next articles are maybe not open access.

Public key cryptography

1993
This paper deals with public key cryptosystems and some of their applications such as password encryption and digital signatures. The necessary mathematical background is also provided.
openaire   +2 more sources

The Mathematics of Public-Key Cryptography

Scientific American, 1979
The electronic communications systems that are proliferating throughout modern society offer speed, accuracy and ever diminishing cost. They also present serious problems of security. As the ordinary transactions cond ucted in person, on the telephone or by written co respondence have come increasingly to be conducted by new kinds of electronic systems
openaire   +2 more sources

Public-Key Cryptography and Availability

2005
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security guarantees of this technology are based on a particular model of computation.
Tage Stabell-Kulø, Simone Lupetti
openaire   +2 more sources

Introduction to Public-Key Cryptography [PDF]

open access: possible, 2014
Cryptography was once considered to be a means of maintaining secrecy of communications only in military affairs and diplomacy. However, today, modern cryptography is used for various purposes in familiar circumstances. Public-key cryptography is a key technology of modern society; it is used for personal authentication, electronic commerce on the ...
openaire   +1 more source

Introduction to Public-Key Cryptography

2010
Before we learn about the basics of public-key cryptography, let us recall that the term public-key cryptography is used interchangeably with asymmetric cryptography; they both denote exactly the same thing and are used synonymously.
Jan Pelzl, Christof Paar
openaire   +2 more sources

An efficient certificateless public key cryptography with authorized equality test in IIoT

Journal of Ambient Intelligence and Humanized Computing, 2019
Rashad Elhabob   +3 more
semanticscholar   +1 more source

Secure limitation analysis of public-key cryptography for smart card settings

World wide web (Bussum), 2019
Youliang Tian   +3 more
semanticscholar   +1 more source

Cancer treatment and survivorship statistics, 2022

Ca-A Cancer Journal for Clinicians, 2022
Kimberly D Miller   +2 more
exaly  

Applications to Public Key Cryptography

2016
In this chapter we describe, at an elementary level, some of the applications of the Group Theory and Number Theory we have developed so far to Cryptology. We emphasise that these “textbook versions” of the applications do not do justice to the complexities that arise in practice, and warn the reader that implementing the mechanisms that we discuss in ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy