Results 41 to 50 of about 4,849 (118)
Fraction-Integer Mehod (FIM) for Calculating Multiplicative Inverse [PDF]
Multiplicative inverse is a crucial operation in public key cryptography. Public key cryptography has given rise to such a need, in which we need to generate a related public/private pair of numbers, each of which is the inverse of the other.
Sattar Aboud
doaj
On the Security of Certificateless Signature Schemes
Wireless Sensor Network (WSN) has proved its presence in various real time applications and hence the security of such embedded devices is a vital issue. Certificateless cryptography is one of the recent paradigms to provide security.
Gaurav Sharma, Suman Bala, Anil K. Verma
doaj +1 more source
A new public key cryptography using generalized Fibonacci matrices [PDF]
This work presents a new public key cryptography encryption-decryption scheme based on generalized Fibonacci matrices and the Hill cipher. This scheme proposes using Fibonacci sequences under prime modulo for key establishment.
Jyoti Panchal +2 more
doaj
RSA: Dagli anni '70 al giorno d'oggi
In this note, after a brief historical excursus, we describe the revolution in cryptography of the 70es, due to the introduction of public key cryptography and the RSA algorithm. We also consider some contemporary applications of this algorithm.
Pellegrini, S
doaj +1 more source
High-Performance NTRU Accelerator Using a Direct Memory Access Controller
NTRU is a well-established and widely used public-key cryptography. It has been standardized in IEEE Std1363.1 and X9.98, and its variant was submitted to the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC ...
Seon Bhin Kim +2 more
doaj +1 more source
RRFL: A rational and reliable federated learning incentive framework for mobile crowdsensing
The data privacy concern for mobile users (MUs) in mobile crowdsensing (MCS) has attracted significant attention. Federated Learning (FL) breaks down data silos, enabling MUs to train locally without revealing actual information.
Qingyi He +3 more
doaj +1 more source
Tamper Localisation Using Quantum Fourier Transform Signatures for Medical Image Authentication
Medical image integrity is critical as telemedicine, cloud PACS and AIāassisted diagnostics become routine. We present a tamper localisation framework that embeds authentication signatures in the phase domain of blockwise quantum Fourier transform (QFT ...
Kumar Sekhar Roy +4 more
doaj +1 more source
Quantum computing and the security of public key cryptography
Kai Li, Pei-Gen Yan, Qing-Yu Cai
doaj +1 more source
Breaking the HFEM public key scheme
To design post-quantum public key cryptography, Zhao,et al presented a novel public key scheme based on the BMQ problem. An equivalent secret key could directly be solved from the public key of their scheme by applying the property of the ergodic matrix ...
Chun-sheng GU
doaj +2 more sources
Empowering IoV Security: A Novel Secure Cryptographic Algorithm (OpCKEE) for Network Protection in Connected Vehicles. [PDF]
Ebadinezhad S, Nlend Bayemi PF.
europepmc +1 more source

