Showing 1 - 20 results of 387 for search '"public-key cryptography"', query time: 0.75s Refine Results
  1. 1

    Mathematics of public key cryptography / by Galbraith, Steven D., author

    Published 2012
    “…"Public key cryptography is a major interdisciplinary subject with many real-world applications, such as digital signatures. …”
  2. 2
  3. 3

    Multivariate Quadratic Equations in Public-key Cryptography by Andrey Valerievich Zhatkin

    Published 2013-02-01
    Subjects: “…public-key cryptography…”
    Get full text
    Article
  4. 4
  5. 5

    Computational Thinking Enrichment: Public-Key Cryptography by Frances ROSAMOND

    Published 2018-04-01
    “…Kid Krypto demonstrates the mathematics underlying public-key cryptography without using advanced mathematics. …”
    Get full text
    Article
  6. 6

    Public key cryptography in resource-constrained WSN by Pathan, Al-Sakib Khan, Hong, Choong Seon

    Published 2008
    “…In this paper we present a detailed review of the works on public key cryptography (PKC) in wireless sensor networks (WSNs). …”
    Get full text
    Monograph
  7. 7
  8. 8
  9. 9

    The performance analysis of public key cryptography-based authentication by Kaiqi Xiong

    Published 2018-05-01
    “…Several Kerberos-based authentication techniques using public-key cryptography have been proposed. Public-key cryptography can be used to eliminate a single point failure problem in the Key Distribution Center (KDC) and achieve better scalability. …”
    Get full text
    Article
  10. 10

    Survey on SAP and its application in public-key cryptography by Goel Neha, Gupta Indivar, Dass B. K.

    Published 2020-07-01
    “…In this paper, we discuss the concept of SAP and present a detailed survey of the work which has been done using it in public-key cryptography.…”
    Get full text
    Article
  11. 11

    An improved public key cryptography based on the elliptic curve by Al-Daoud, Essam Faleh

    Published 2002
    Subjects: “…Public key cryptography…”
    Get full text
    Thesis
  12. 12

    Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications by Jasone Astorga, Marc Barcelo, Aitor Urbieta, Eduardo Jacob

    Published 2022-03-01
    “…This paper identifies and describes the main challenges to implement certificate-based public key cryptography in IIoT environments and it surveys the alternative approaches proposed so far in the literature to address these challenges. …”
    Get full text
    Article
  13. 13

    Recent progress in the security evaluation of multivariate public‐key cryptography by Yasuhiko Ikematsu, Shuhei Nakamura, Tsuyoshi Takagi

    Published 2023-03-01
    “…Abstract Multivariate public‐key cryptography (MPKC) is considered a leading candidate for post‐quantum cryptography (PQC). …”
    Get full text
    Article
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    A Group Law on the Projective Plane with Applications in Public Key Cryptography by Raúl Durán Díaz, Luis Hernández Encinas, Jaime Muñoz Masqué

    Published 2020-05-01
    “…In the context of new threats to Public Key Cryptography arising from a growing computational power both in classic and in quantum worlds, we present a new group law defined on a subset of the projective plane <inline-formula> <math display="inline"> <semantics> <mrow> <mi mathvariant="double-struck">F</mi> <msup> <mi>P</mi> <mn>2</mn> </msup> </mrow> </semantics> </math> </inline-formula> over an arbitrary field <inline-formula> <math display="inline"> <semantics> <mi mathvariant="double-struck">F</mi> </semantics> </math> </inline-formula>, which lends itself to applications in Public Key Cryptography and turns out to be more efficient in terms of computational resources. …”
    Get full text
    Article
  19. 19

    Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles by Rashad Elhabob, Yanan Zhao, Iva Sella, Hu Xiong

    Published 2019-01-01
    “…To address this challenge, an efficient certificateless public key cryptography with equality test (CL-PKC-ET) is presented in this paper. …”
    Get full text
    Article
  20. 20