Showing 21 - 40 results of 378 for search '"Cryptography"', query time: 0.04s Refine Results
  1. 21
  2. 22

    Recent progress in the security evaluation of multivariate public‐key cryptography by Yasuhiko Ikematsu, Shuhei Nakamura, Tsuyoshi Takagi

    Published 2023-03-01
    “…Abstract Multivariate public‐key cryptography (MPKC) is considered a leading candidate for post‐quantum cryptography (PQC). …”
    Get full text
    Article
  3. 23
  4. 24

    An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms by Huan Wang, Zhongyuan Jiang, Qing Qian, Hong Wang

    Published 2022-04-01
    “…This article proposes an efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms, which includes an encryption and a decryption schemes for gray-scale and color secret images. …”
    Get full text
    Article
  5. 25
  6. 26
  7. 27
  8. 28
  9. 29
  10. 30
  11. 31
  12. 32

    Elliptic-Curve Cryptography Implementation on RISC-V Processors for Internet of Things Applications by Preethi Preethi, Mohammed Mujeer Ulla, G. Praveen Kumar Yadav, Kumar Sekhar Roy, Ruhul Amin Hazarika, Kuldeep Saxena K.

    Published 2024-01-01
    “…Elliptic-curve cryptography (ECC) is a popular technique of public-key cryptography used for secure communications in Internet of Things (IoT) applications. …”
    Get full text
    Article
  13. 33
  14. 34

    Research of the small Qubit quantum computing attack to the RSA public key cryptography by Bao-nan WANG, Yu-hang CHEN, Bao YIN, Feng HU, Huan-guo ZHANG, Chao WANG

    Published 2017-10-01
    “…The small Qubit quantum algorithm attack to RSA was proposed,the need Qubit of the first quantum register from 2L to L1,it can be reduced to 2 Qubit,the overall space complexity denoted (L1,L),where 2L1≥r,r is the period of decomposed.Because of the reduce of the first quantum register,it reduces the algorithm’s complexity and success rates,and use the binary look-up table method to compute the modular exponentiation,it enhances the computing speed.The improved algorithm’s quantum circuit complexity is T=O(2L2).It have a significant improvement on the time complexity and space complexity.Although the success rate is reduced,the overall success solution time is still lower than the Shor algorithm and the current major improvements Shor algorithm.Completed a simulation experiment.Respectively use the 11、10、9 Qubit decomposing the quantum circuit 119.The new algorithm explore the reality of using a universal quantum computer device to decipher the public key cryptography.…”
    Get full text
    Article
  15. 35

    Perspectives on Entangled Nuclear Particle Pairs Generation and Manipulation in Quantum Communication and Cryptography Systems by Octavian Dănilă, Paul E. Sterian, Andreea Rodica Sterian

    Published 2012-01-01
    “…Entanglement between two quantum elements is a phenomenon which presents a broad application spectrum, being used largely in quantum cryptography schemes and in physical characterisation of the universe. …”
    Get full text
    Article
  16. 36

    Certificateless public key cryptography based provable data possession scheme in edge environment by Ziyuan WANG, Ruizhong DU

    Published 2022-07-01
    Subjects: “…certificateless public key cryptography…”
    Get full text
    Article
  17. 37
  18. 38
  19. 39
  20. 40