Results 311 to 320 of about 511,689 (360)
Some of the next articles are maybe not open access.
1993
This paper deals with public key cryptosystems and some of their applications such as password encryption and digital signatures. The necessary mathematical background is also provided.
openaire +2 more sources
This paper deals with public key cryptosystems and some of their applications such as password encryption and digital signatures. The necessary mathematical background is also provided.
openaire +2 more sources
The Mathematics of Public-Key Cryptography
Scientific American, 1979The electronic communications systems that are proliferating throughout modern society offer speed, accuracy and ever diminishing cost. They also present serious problems of security. As the ordinary transactions cond ucted in person, on the telephone or by written co respondence have come increasingly to be conducted by new kinds of electronic systems
openaire +2 more sources
Public-Key Cryptography and Availability
2005When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security guarantees of this technology are based on a particular model of computation.
Tage Stabell-Kulø, Simone Lupetti
openaire +2 more sources
Introduction to Public-Key Cryptography [PDF]
Cryptography was once considered to be a means of maintaining secrecy of communications only in military affairs and diplomacy. However, today, modern cryptography is used for various purposes in familiar circumstances. Public-key cryptography is a key technology of modern society; it is used for personal authentication, electronic commerce on the ...
openaire +1 more source
Journal of Network and Computer Applications, 2019
Bidi Ying, A. Nayak
semanticscholar +1 more source
Bidi Ying, A. Nayak
semanticscholar +1 more source
Introduction to Public-Key Cryptography
2010Before we learn about the basics of public-key cryptography, let us recall that the term public-key cryptography is used interchangeably with asymmetric cryptography; they both denote exactly the same thing and are used synonymously.
Jan Pelzl, Christof Paar
openaire +2 more sources
An efficient certificateless public key cryptography with authorized equality test in IIoT
Journal of Ambient Intelligence and Humanized Computing, 2019Rashad Elhabob +3 more
semanticscholar +1 more source
Secure limitation analysis of public-key cryptography for smart card settings
World wide web (Bussum), 2019Youliang Tian +3 more
semanticscholar +1 more source
Cancer treatment and survivorship statistics, 2022
Ca-A Cancer Journal for Clinicians, 2022Kimberly D Miller +2 more
exaly
Applications to Public Key Cryptography
2016In this chapter we describe, at an elementary level, some of the applications of the Group Theory and Number Theory we have developed so far to Cryptology. We emphasise that these “textbook versions” of the applications do not do justice to the complexities that arise in practice, and warn the reader that implementing the mechanisms that we discuss in ...
openaire +2 more sources

