• No results found

Public Key Cryptography

SPEED AND SECURITY ENHANCEMENT THROUGH PUBLIC KEY CRYPTOGRAPHY

SPEED AND SECURITY ENHANCEMENT THROUGH PUBLIC KEY CRYPTOGRAPHY

... It is true that the transfer of data is essential in the fast developing world. It is equally true that the transfer of data to be taken place with much security by not giving groom to the intruders. This paper presents ...

6

ABCRNG - Swarm Intelligence in Public key Cryptography for Random Number Generation

ABCRNG - Swarm Intelligence in Public key Cryptography for Random Number Generation

... Abstract. Cryptography is an important tool for protecting and securing ...In public key cryptography, the key generation plays a vital role for strengthening the ...in key ...

10

RSA Public Key Cryptography Algorithm  A Review

RSA Public Key Cryptography Algorithm A Review

... in cryptography, as a major component enabling secure communications over ...networks. Cryptography looks at methods of hiding the actual message from unintended recipients by scrambling the data via an ...

5

Optimized Multi-Precision Multiplication for Public-Key Cryptography on Embedded Microprocessors

Optimized Multi-Precision Multiplication for Public-Key Cryptography on Embedded Microprocessors

... Public key cryptography methods such as RSA [1], ECC [2], and pairing [3] involve computation-intensive arithmetic operations; in particular, multiplication accounts for most of the execution time of ...

5

Securing DNA Information through Public Key Cryptography

Securing DNA Information through Public Key Cryptography

... symmetric key cryptography ...integrating public key cryptography inside traditional DNA security ...symmetric key cryptography and the key used to encrypt the data ...

16

From  Laconic  Zero-Knowledge  to  Public-Key  Cryptography

From Laconic Zero-Knowledge to Public-Key Cryptography

... in cryptography, we are currently very far from es- tablishing the security of public-key cryptography ...of public-key encryption from a handful of assumptions, most notably ...

25

Review of MANETS Using Distributed Public-key Cryptography

Review of MANETS Using Distributed Public-key Cryptography

... Based Key Management in MANETs using Public Key ...as Public Key Infrastructure (PKI) requires a central authority or trusted third party to provide fundamental security services ...

5

Improving authentication mechanism for using extended public key cryptography in mobile adhoc network

Improving authentication mechanism for using extended public key cryptography in mobile adhoc network

... II. The protocol is handling the some special situation like nodes joining the network, node leaving the network and nodes are changing its position within the network. The monitor mode of AMSRP handles all three ...

8

PUBLIC KEY CRYPTOGRAPHY WITH SYSTEM OF NON-HOMOGENEOUS EQUATIONS

PUBLIC KEY CRYPTOGRAPHY WITH SYSTEM OF NON-HOMOGENEOUS EQUATIONS

... Public Key Cryptography with system of non-homogeneous linear equations is a two-stage secured ...for key generation and public encryption whose security is based on solving system of ...

8

The performance analysis of public key cryptography-based authentication

The performance analysis of public key cryptography-based authentication

... ing public key cryptography with Kerberos in different authentication ...of public key cryptography in the Windows 2000 and 2003 implementations of Kerberos ...

15

Pseudo Random Generator Based Public Key Cryptography

Pseudo Random Generator Based Public Key Cryptography

... using public key Cryptography is an efficient system for correction of channel decoding results of messages which are protected by security ...of cryptography system as no additional ...

5

Enhancement over the Variant of Public Key Cryptography (PKC) Algorithm

Enhancement over the Variant of Public Key Cryptography (PKC) Algorithm

... of cryptography [1].Today‟s cryptography is extremely more complex than its ...modern cryptography is addressed,it generally refers to cryptosystems because it comprises of the study and practice of ...

6

Alternate Representations of the Public Key Cryptography Standards (PKCS) Using S-Expressions, S-PKCS

Alternate Representations of the Public Key Cryptography Standards (PKCS) Using S-Expressions, S-PKCS

... Inc. Public Key Cryptography Standards (PKCS) documents describe structured data that must be represented inside encrypted blobs or transferred to a second ...

12

A Review on Public Key Cryptography: Algorithms

A Review on Public Key Cryptography: Algorithms

... Secret Key Cryptography which is also known as Symmetric Key Cryptography and ii) Public Key Cryptography which is also known as Asymmetric Key ...same key ...

7

White-Box  Implementation  of  the  Identity-Based  Signature  Scheme  in  the  IEEE  P1363  Standard  for  Public  Key  Cryptography

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography

... black-box cryptography, an adversary in a white-box security model has full access to the implementation of the cryptographic ...for public key ...private key to multiple lookup tables, so ...

14

Public-Key Cryptography Techniques Evaluation

Public-Key Cryptography Techniques Evaluation

... – Cryptography techniques play an important role in modern ...current cryptography techniques provide more sophisticated services, such as message integrity, authentication, time stamping, and many ...for ...

12

Autoencoder Artificial Neural Network Public Key Cryptography in Unsecure Public channel Communication

Autoencoder Artificial Neural Network Public Key Cryptography in Unsecure Public channel Communication

... neural cryptography implementation”, 2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), ISSN: ...in cryptography: A review”, 2016 World Conference on Futuristic ...

10

How  to  Keep  a  Secret:   Leakage  Deterring  Public-key  Cryptography

How to Keep a Secret: Leakage Deterring Public-key Cryptography

... leakage-deterring public-key encryption ensures there is no way to optimize this operation: if one wants to provide access to his decryption he has to do it on a “per-ciphertext” ...

32

SERVER BASED OPEN PUBLIC KEY CRYPTOGRAPHY WITH KEYWORD SEARCH TECHNIQUE

SERVER BASED OPEN PUBLIC KEY CRYPTOGRAPHY WITH KEYWORD SEARCH TECHNIQUE

... 483 | P a g e conquer this confinement, Baeket al. proposed another PEKS conspire without requiring a protected channel, which is alluded to as a safe sans channel PEKS (SCF-PEKS). The thought is to include the server's ...

8

SERVER BASED OPEN PUBLIC KEY CRYPTOGRAPHY WITH KEYWORD SEARCH TECHNIQUE

SERVER BASED OPEN PUBLIC KEY CRYPTOGRAPHY WITH KEYWORD SEARCH TECHNIQUE

... SA-PEKS is roused by the perception that the disconnected KGA can be managed by utilizing a semi-trusted outsider, to be specific Keyword Server (KS) which is isolated from the Storage Server (SS), as appeared in ...

8

Show all 10000 documents...

Related subjects