Results 321 to 330 of about 511,689 (360)
Some of the next articles are maybe not open access.
IEEE Transactions on Information Forensics and Security, 2016
De-biao He +3 more
semanticscholar +1 more source
De-biao He +3 more
semanticscholar +1 more source
Public-Key Cryptography in the Fine-Grained Setting
IACR Cryptology ePrint Archive, 2019Rio LaVigne +2 more
semanticscholar +1 more source
Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography
IEEE transactions on circuits and systems for video technology (Print), 2016Xinpeng Zhang +3 more
semanticscholar +1 more source
The Complexity of Public-Key Cryptography
Tutorials on the Foundations of Cryptography, 2017B. Barak
semanticscholar +1 more source
Introduction to Public Key Cryptography
1993We begin with an introduction to private and public key cryptography, and then proceed to introduce elliptic curve cryptosystems.
openaire +2 more sources
Encrypted image-based reversible data hiding with public key cryptography from difference expansion
Signal processing. Image communication, 2015Chih-Wei Shiu, Yu-Chi Chen, Wien Hong
semanticscholar +1 more source
Image encryption and decryption in public key cryptography based on MR
International Conference on Computing and Convergence Technology, 2015Hiral Rathod, M. S. Sisodia, A. N. Reddy
semanticscholar +1 more source
Dual Isogenies and Their Application to Public-key Compression for Isogeny-based Cryptography
IACR Cryptology ePrint Archive, 2019M. Naehrig, Joost Renes
semanticscholar +1 more source
Implementing public-key cryptography on passive RFID tags is practical
International Journal of Information Security, 2014Alex Arbit +3 more
semanticscholar +1 more source

