-
1
Mathematics of public key cryptography /
Published 2012“…"Public key cryptography is a major interdisciplinary subject with many real-world applications, such as digital signatures. …”
-
2
On Multiple Encryption for Public-Key Cryptography
Published 2023-10-01Subjects: Get full text
Article -
3
Multivariate Quadratic Equations in Public-key Cryptography
Published 2013-02-01Subjects: “…public-key cryptography…”
Get full text
Article -
4
Quantum computing and the security of public key cryptography
Published 2021-01-01Get full text
Article -
5
Computational Thinking Enrichment: Public-Key Cryptography
Published 2018-04-01“…Kid Krypto demonstrates the mathematics underlying public-key cryptography without using advanced mathematics. …”
Get full text
Article -
6
Public key cryptography in resource-constrained WSN
Published 2008“…In this paper we present a detailed review of the works on public key cryptography (PKC) in wireless sensor networks (WSNs). …”
Get full text
Monograph -
7
-
8
Public-Key Cryptography Based on Tropical Circular Matrices
Published 2022-07-01Get full text
Article -
9
The performance analysis of public key cryptography-based authentication
Published 2018-05-01“…Several Kerberos-based authentication techniques using public-key cryptography have been proposed. Public-key cryptography can be used to eliminate a single point failure problem in the Key Distribution Center (KDC) and achieve better scalability. …”
Get full text
Article -
10
Survey on SAP and its application in public-key cryptography
Published 2020-07-01“…In this paper, we discuss the concept of SAP and present a detailed survey of the work which has been done using it in public-key cryptography.…”
Get full text
Article -
11
An improved public key cryptography based on the elliptic curve
Published 2002Subjects: “…Public key cryptography…”
Get full text
Thesis -
12
Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications
Published 2022-03-01“…This paper identifies and describes the main challenges to implement certificate-based public key cryptography in IIoT environments and it surveys the alternative approaches proposed so far in the literature to address these challenges. …”
Get full text
Article -
13
Recent progress in the security evaluation of multivariate public‐key cryptography
Published 2023-03-01“…Abstract Multivariate public‐key cryptography (MPKC) is considered a leading candidate for post‐quantum cryptography (PQC). …”
Get full text
Article -
14
New approach to practical leakage-resilient public-key cryptography
Published 2020-07-01Subjects: Get full text
Article -
15
-
16
A web demo of RSA public key cryptography algorithms
Published 2019Get full text
Final Year Project (FYP) -
17
Separable Reversible Data Hiding in Encrypted Signals with Public Key Cryptography
Published 2018-01-01Subjects: Get full text
Article -
18
A Group Law on the Projective Plane with Applications in Public Key Cryptography
Published 2020-05-01“…In the context of new threats to Public Key Cryptography arising from a growing computational power both in classic and in quantum worlds, we present a new group law defined on a subset of the projective plane <inline-formula> <math display="inline"> <semantics> <mrow> <mi mathvariant="double-struck">F</mi> <msup> <mi>P</mi> <mn>2</mn> </msup> </mrow> </semantics> </math> </inline-formula> over an arbitrary field <inline-formula> <math display="inline"> <semantics> <mi mathvariant="double-struck">F</mi> </semantics> </math> </inline-formula>, which lends itself to applications in Public Key Cryptography and turns out to be more efficient in terms of computational resources. …”
Get full text
Article -
19
Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles
Published 2019-01-01“…To address this challenge, an efficient certificateless public key cryptography with equality test (CL-PKC-ET) is presented in this paper. …”
Get full text
Article -
20
Intellectual property protection for FPGA designs using the public key cryptography
Published 2019-03-01Get full text
Article