Showing 221 - 240 results of 378 for search '"Cryptography"', query time: 0.04s Refine Results
  1. 221

    Efficient certificateless multi-receiver anonymous signcryption scheme by Yan-lin QIN, Xiao-ping WU, Wei HU

    Published 2016-06-01
    Subjects: “…certificateless cryptography…”
    Get full text
    Article
  2. 222
  3. 223
  4. 224
  5. 225
  6. 226

    On the Security of Certificateless Signature Schemes by Gaurav Sharma, Suman Bala, Anil K. Verma

    Published 2013-06-01
    “…Certificateless public key cryptography (CL-PKC) deals effectively with the twin issues of certificate management in traditional public key cryptography and key escrow problem in identity-based cryptography. …”
    Get full text
    Article
  7. 227

    RETRACTED: Parallel Encryption With Digit Arithmetic Of Covertext Model Using Duplicated Covertext by Hari Murti, Edy Supriyanto, Rara Redjeki, Eka Ardhianto

    Published 2022-12-01
    “…Furthermore, public key cryptography is the type of cryptography that using two interrelated keys, namely the public and private keys. …”
    Get full text
    Article
  8. 228

    ECC fault attack algorithm based on Grover's quantum search algorithm with 0.1π phase rotation by Chao WANG, Lin CAO, Hui-hui JIA, Feng HU

    Published 2017-08-01
    “…The Grover's a1gorithm was used for fau1t attack against the pub1ic key cryptography.A fixed phase rotation based Grover's a1gorithm was proposed,and the probabi1ity of success achieved 99.23% with 0.1π phase rotation.Combined with the fau1t attack further,ECC(e11iptic curve cryptography)vo1tage burr attack a1gorithm based on Grover a1gorithm with 0.1π phase rotation was proposed.Then a safety Kob1itz curve,K-163,pub1ished successfu11y attacked by NIST on binary domain in simu1ation and the success rate was 100%.The comp1exity of the attack great1y reduces on the exponentia1.It was a new effective way,except the Shor's a1gorithm,to attack pub1ic key cryptography by quantum computing,and it contributed to extend the attack ways to the other pub1ic key cryptography.…”
    Get full text
    Article
  9. 229

    Security analysis and improvement of a certificateless signcryption scheme by Zhen-guo ZHAO

    Published 2015-03-01
    “…To solve the certificate management problem in the traditional public key cryptography and the key escrow problem in the identity-based public key cryptography, Al-Riyami and Paterson proposed the concept of the certificateless public key cryptography.Recently,Zhu et al.proposed a certificateless signcryption without bilinear pairings.However, their scheme was completely insecure against with two concrete attacks. …”
    Get full text
    Article
  10. 230
  11. 231
  12. 232

    Shaping the future of commercial quantum computer and the challenge for information security by Chao WANG, Yun-jiang WANG, Feng HU

    Published 2016-03-01
    “…Additionally, it was the first time to use the quantum computer for designing cryptography and it shed an interesting light on cryptography design based on the quantum artificial intelligence which had not been reported anywhere before.…”
    Get full text
    Article
  13. 233
  14. 234

    Implementasi Teknik Enkripsi dan Dekripsi dI File Video Menggunakan Algoritma Blowfish by Nuniek Fahriani, Harunur Rosyid

    Published 2019-12-01
    “…Dibangun berbasis desktop.   Abstract Cryptography (cryptography) is a data security process to keep messages (files) from being "disturbed" by third parties. …”
    Get full text
    Article
  15. 235
  16. 236
  17. 237

    Some Graph-Based Encryption Schemes by Baizhu Ni, Rabiha Qazi, Shafiq Ur Rehman, Ghulam Farid

    Published 2021-01-01
    “…In today’s technological world, confidentiality is an important issue to deal with, and it is carried out through different proficiencies. Cryptography is a scientific technique of securing a communication from unauthenticated approach. …”
    Get full text
    Article
  18. 238

    Certificateless signature scheme without bilinear pairings by Sheng-bao WANG, Wen-hao LIU, Qi XIE

    Published 2012-04-01
    “…To solve the key escrow problem inherited in ID-based cryptography and the complex certificate management problem of traditional certification-based public key cryptosystem,Al-Riyami and Paterson proposed the novel concept of certificateless public key cryptography.Almost all existing certificateless signature schemes need bilinear pairings either during signature generation stage or the signature verification stage,and were proven secure only with stronger computational assumptions.A new certificateless signature scheme without pairings was proposed.The scheme is provably secure in the random oracle model(ROM)under the relatively weaker assumption,i.e.…”
    Get full text
    Article
  19. 239
  20. 240

    Synthesis of symmetric paths of arbiter physically unclonable function on FPGA by A. A. Ivaniuk

    Published 2019-06-01
    “…Physical cryptography is one of the current trends among the existing methods of protecting digital devices from illegal access. …”
    Get full text
    Article