Results 41 to 50 of about 4,849 (118)

Fraction-Integer Mehod (FIM) for Calculating Multiplicative Inverse [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2004
Multiplicative inverse is a crucial operation in public key cryptography. Public key cryptography has given rise to such a need, in which we need to generate a related public/private pair of numbers, each of which is the inverse of the other.
Sattar Aboud
doaj  

On the Security of Certificateless Signature Schemes

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Wireless Sensor Network (WSN) has proved its presence in various real time applications and hence the security of such embedded devices is a vital issue. Certificateless cryptography is one of the recent paradigms to provide security.
Gaurav Sharma, Suman Bala, Anil K. Verma
doaj   +1 more source

A new public key cryptography using generalized Fibonacci matrices [PDF]

open access: yesSurveys in Mathematics and its Applications
This work presents a new public key cryptography encryption-decryption scheme based on generalized Fibonacci matrices and the Hill cipher. This scheme proposes using Fibonacci sequences under prime modulo for key establishment.
Jyoti Panchal   +2 more
doaj  

RSA: Dagli anni '70 al giorno d'oggi

open access: yesAtti della Accademia Peloritana dei Pericolanti : Classe di Scienze Fisiche, Matematiche e Naturali, 2006
In this note, after a brief historical excursus, we describe the revolution in cryptography of the 70es, due to the introduction of public key cryptography and the RSA algorithm. We also consider some contemporary applications of this algorithm.
Pellegrini, S
doaj   +1 more source

High-Performance NTRU Accelerator Using a Direct Memory Access Controller

open access: yesIEEE Access
NTRU is a well-established and widely used public-key cryptography. It has been standardized in IEEE Std1363.1 and X9.98, and its variant was submitted to the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC ...
Seon Bhin Kim   +2 more
doaj   +1 more source

RRFL: A rational and reliable federated learning incentive framework for mobile crowdsensing

open access: yesJournal of King Saud University: Computer and Information Sciences
The data privacy concern for mobile users (MUs) in mobile crowdsensing (MCS) has attracted significant attention. Federated Learning (FL) breaks down data silos, enabling MUs to train locally without revealing actual information.
Qingyi He   +3 more
doaj   +1 more source

Tamper Localisation Using Quantum Fourier Transform Signatures for Medical Image Authentication

open access: yesIET Quantum Communication
Medical image integrity is critical as telemedicine, cloud PACS and AI‐assisted diagnostics become routine. We present a tamper localisation framework that embeds authentication signatures in the phase domain of blockwise quantum Fourier transform (QFT ...
Kumar Sekhar Roy   +4 more
doaj   +1 more source

Quantum computing and the security of public key cryptography

open access: yesFundamental Research, 2021
Kai Li, Pei-Gen Yan, Qing-Yu Cai
doaj   +1 more source

Breaking the HFEM public key scheme

open access: yesTongxin xuebao, 2013
To design post-quantum public key cryptography, Zhao,et al presented a novel public key scheme based on the BMQ problem. An equivalent secret key could directly be solved from the public key of their scheme by applying the property of the ergodic matrix ...
Chun-sheng GU
doaj   +2 more sources

Home - About - Disclaimer - Privacy