Search

Your search keyword '"PUBLIC key cryptography"' showing total 515 results

Search Constraints

Start Over You searched for: Descriptor "PUBLIC key cryptography" Remove constraint Descriptor: "PUBLIC key cryptography" Topic computer security Remove constraint Topic: computer security
515 results on '"PUBLIC key cryptography"'

Search Results

1. A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments.

3. Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.

4. Review of Methodologies and Metrics for Assessing the Quality of Random Number Generators.

5. A Survey on Post-Quantum Public-Key Signature Schemes for Secure Vehicular Communications.

6. Continuous Leakage-Amplified Public-Key Encryption With CCA Security.

7. Decentralized Public-Key Infrastructure With Blockchain in V2X Communications: Promising or Only Euphoria?

8. Leveraging the power of quantum computing for breaking RSA encryption.

9. Far-Sighted Thinking about Deleterious Computer-Related Events.

10. Post-Quantum Lattice-Based Cryptography Implementations: A Survey.

11. Accountable identity-based encryption with distributed private key generators.

12. Long-Term Confidentiality of PKI.

13. Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments.

14. Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications.

15. Efficient Fully Homomorphic Encryption with Large Plaintext Space.

16. Direct visualization of cryptographic keys for enhanced security.

17. An applications of signed quadratic residues in public key cryptography.

18. Generalized Tweakable Even-Mansour Cipher and Its Applications.

19. HOW TO KEEP SECRETS SAFE.

20. A Question of Trust.

21. BEST-KEPT SECRETS.

22. Designing Cryptography for the New Century.

23. Cryptanalysis of RSA and Its Variants

24. Efficient revocable hierarchical identity-based encryption using cryptographic accumulators.

25. Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.

26. Key-Recovery Attacks on ASASA.

27. A scalable framework for protecting user identity and access pattern in untrusted Web server using forward secrecy, public key encryption and bloom filter.

28. A STUDY OF BILINEAR MAPS IN WIRELESS SENSOR NETWORKS.

29. Continuous leakage-resilient certificateless public key encryption with CCA security.

30. Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption.

31. ACM FORUM.

32. Processing Encrypted Data.

33. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.

34. The Mathematics of Public-Key Cryptography.

35. Identity-Based Cryptography

36. Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status

37. Postquantum Opportunities: Lattices, Homomorphic Encryption, and Supersingular Isogeny Graphs.

38. Code-Based Cryptography: State of the Art and Perspectives.

40. The Day the Cryptography Dies.

41. Hash-Based Signatures: State of Play.

42. Implementation & Security Analysis for RSA based Algorithms on Variable Key Length.

43. Dynamic attribute based vehicle authentication.

44. Multi-message and multi-receiver heterogeneous signcryption scheme for ad-hoc networks.

45. Public Key Cryptographic Technique Based On Suzuki 2-Group.

46. Separations in circular security for arbitrary length key cycles, revisited.

47. Security Issue In Mobile Ad-Hoc Network.

49. INFORMATION SECURITY: 50 YEARS BEHIND, 50 YEARS AHEAD.

50. Anonymous certificate-based broadcast encryption with constant decryption cost.

Catalog

Books, media, physical & digital resources