Search

Your search keyword '"PUBLIC key cryptography"' showing total 2,135 results

Search Constraints

Start Over You searched for: Descriptor "PUBLIC key cryptography" Remove constraint Descriptor: "PUBLIC key cryptography" Database Academic Search Index Remove constraint Database: Academic Search Index
2,135 results on '"PUBLIC key cryptography"'

Search Results

1. Random permutation-based mixed-double scrambling technique for encrypting MQIR image.

2. Indistinguishability Obfuscation from Well-Founded Assumptions.

3. Improving the success rate of quantum algorithm attacking RSA encryption system.

4. Blockchain-assisted post-quantum privacy-preserving public auditing scheme to secure multimedia data in cloud storage.

5. A Novel DDoS Mitigation Strategy in 5G-Based Vehicular Networks Using Chebyshev Polynomials.

6. Anonymous Proxy signature scheme based on multivariate polynomials over finite field.

7. Post-quantum security design for hierarchical healthcare systems based on lattices.

8. Multi-party codebook distribution strategy based on secret sharing.

9. A compliance-based ranking of certificate authorities using probabilistic approaches.

10. Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions.

11. Secured wireless sensor networks using hybrid Rivest Shamir Adleman with ant lion optimization algorithm.

12. On Two Modifications of the McEliece PKE and the CFS Signature Scheme.

13. Robust Subgroup Multisignature with One-Time Public Keys in Order.

14. An Optimized Encryption Storage Scheme for Blockchain Data Based on Cold and Hot Blocks and Threshold Secret Sharing.

15. A Biometric Key-Enhanced Multimedia Encryption Algorithm for Social Media Blockchain.

16. CryptoHHO: a bio-inspired cryptosystem for data security in Fog–Cloud architecture.

17. Quantum rectangular MinRank attack on multi-layer UOV signature schemes.

18. Multi-level authentication for security in cloud using improved quantum key distribution.

19. Token open secure and practical NTRU-based updatable encryption.

20. DTR-SHIELD: Mutual Synchronization for Protecting against DoS Attacks on the SHIELD Protocol with AES-CTR Mode.

21. A Sustainable Data Encryption Storage and Processing Framework via Edge Computing-Driven IoT.

22. A Secure Protocol Authentication Method Based on the Strand Space Model for Blockchain-Based Industrial Internet of Things.

23. Expanded low-rank parity-check codes and their application to cryptography.

24. A Secure Certificate-Based Data Integrity Auditing Protocol with Cloud Service Providers.

25. Enabling privacy-preserving data validation from multi-writer encryption with aggregated keywords search.

26. A Fountain-Coding Based Cooperative Jamming Strategy for Secure Service Migration in Edge Computing.

27. Delegatable searchable encryption with specified keywords for EHR systems.

28. Design of an Alternative to Polynomial Modified RSA Algorithm.

29. The power-generalized k-Horadam sequences in different modules and a new cryptographic method with these sequences.

30. "A lightweight authentication scheme for 6LoWPAN-based Internet-of -things".

31. Study on the Stability of Complex Networks in the Stock Markets of Key Industries in China.

32. Analysis on improved scheme for reversible data hiding for encrypted images.

33. A secured self-financial management application with RSA encryption technology.

34. Elliptic curve matrix group ring for discrete logarithm public key cryptosystems.

35. New formula of Huff's curve for public key cryptosystems.

36. Reduction of complexity in asymmetric cryptography using RSA, RSA-CRT and novel N-prime RSA with different keys.

37. Signcryption technique with generalization of the Elgamal algorithm and Ong-Schnorr-Shamir algorithm on digital messages.

38. On the tropical two-sided discrete logarithm and a key exchange protocol based on the tropical algebra of pairs.

39. Improved RSA with Enhanced Security on STM32 @ 84MHz.

40. Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance.

41. Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography.

42. A Provably Secure Anonymous Authentication Protocol for Consumer and Service Provider Information Transmissions in Smart Grids.

43. An Efficient Homomorphic Argmax Approximation for Privacy-Preserving Neural Networks.

44. Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation.

45. A generic framework for blockchain-assisted on-chain auditing for off-chain storage.

46. AutoPKI: public key infrastructure for IoT with automated trust transfer.

47. QBIoV: a secure data sharing scheme for the Internet of vehicles based on quantum-enabled blockchain.

48. A Ciphertext Reduction Scheme for Garbling an S-Box in an AES Circuit with Minimal Online Time.

49. Lattice-Based Revocable Certificateless Public Key Encryption for Team Score Orienteering.

50. Novel lightweight and fine-grained fast access control using RNS properties in fog computing.

Catalog

Books, media, physical & digital resources