Printer Friendly

Browse Public key encryption topic


1-92 out of 92 article(s)
Title Author Type Date Words
The new Weakness of RSA and The Algorithm to Solve this Problem. Somsuk, Kritsanapong Sep 1, 2020 7668
A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model. Lu, Yang; Li, Jiguo Report Mar 1, 2019 10509
w-Bit Shifting Non-Adjacent Form Conversion. Hwang, Doo-Hee; Choi, Yoon-Ho Report Jul 1, 2018 8781
New Public Key Encryption with Equality Test Based on non-Abelian Factorization Problems. Zhu, Huijun; Wang, Licheng; Qiu, Shuming; Niu, Xinxin Report Feb 1, 2018 6930
Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group. Deng, Lunzhi; Yang, Yixian; Chen, Yuling Report Nov 1, 2017 7509
An Improved Authentication and Key Agreement Scheme for Session Initial Protocol. Wu, Libing; Fan, Jing; Xie, Yong; Wang, Jing Report Aug 1, 2017 8680
New construction of short certificate-based signature against existential forgery attacks. Lu, Yang; Wang, Gang; Li, Jiguo; Shen, Jian Report Jul 1, 2017 11901
HS-Sign: A security enhanced UOV signature scheme based on hyper-sphere. Chen, Jiahui; Tang, Shaohua; Zhang, Xinglin Report Jun 1, 2017 10327
Software simulation of variable size message encryption based RSA Crypto-Algorithm using Ms. C#. NET. Al-Qadeeb, Hasan; Al-Haija, Qasem Abu; Jebril, Noor A. Report Jan 1, 2017 3940
Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker. Wazan, Ahmad Samer; Laborde, Romain; Chadwick, David W.; Barrere, Francois; Benzekri, Abdelmalek; Ka Report Jan 1, 2017 16951
Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications. Hu, Xiaoming; Tan, Wenan; Xu, Huajie; Wang, Jian; Ma, Chuang Report Jan 1, 2017 7319
Building Secure Public Key Encryption Scheme from Hidden Field Equations. Ping, Yuan; Wang, Baocang; Yang, Yuehua; Tian, Shengli Report Jan 1, 2017 4115
Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption. Han, Shuai; Liu, Shengli; Lyu, Lin Report Jan 1, 2017 21192
Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC. Yang, Wenjie; Weng, Jian; Luo, Weiqi; Yang, Anjia Report Jan 1, 2017 6461
Calculating and evaluating trustworthiness of certification authority. El uahhabi, Zakia; El bakkali, Hanan Report Dec 1, 2016 7908
RSA-type algebra structures. Tran, Long D.; Tran, Thu D.; Choi, Deokjai; Nguyen, Thuc D. Report Jun 1, 2016 6127
Calculation of the key length for quantum key distribution. Mehic, Miralem; Niemiec, Marcin; Voznak, Miroslav Report Dec 1, 2015 4135
A new public key encryption scheme based on layered cellular automata. Zhang, Xing; Lu, Rongxing; Zhang, Hong; Xu, Chungen Report Oct 1, 2014 8531
A unique location-key pair based security for wireless sensor network. Amuthavalli, R.; Bhuvaneswaran, R.S. Report Sep 15, 2014 2763
A new sender-side public-key deniable encryption scheme with fast decryption. Barakat, Tamer Mohamed Report Sep 1, 2014 7169
An efficient and provable secure certificateless identification scheme in the standard model. Chin, Ji-Jian; Heng, Swee-Huay; Phan, Raphael C.-W. Report Jul 1, 2014 9637
Provably secure certificate-based signcryption scheme without pairings. Lu, Yang; Li, Jiguo Report Jul 1, 2014 12001
Toward efficient convertible authenticated encryption schemes using self-certified public key system. Wu, Tzong-Sun; Chen, Yih-Sen; Lin, Han-Yu Report Mar 1, 2014 9020
NSA knows: secret digital back doors. Suderman, Peter Brief article Feb 1, 2014 188
On the security of a simple three-party key exchange protocol without server's public keys. Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho Report Jan 1, 2014 3842
On the improvement of Wiener attack on RSA with small private exponent. Wu, Mu-En; Chen, Chien-Ming; Lin, Yue-Hsun; Sun, Hung-Min Report Jan 1, 2014 7024
Two-factor user authentication with key agreement scheme based on elliptic curve cryptosystem. Qu, Juan; Tan, Xiao-Ling Report Jan 1, 2014 4714
Secure collaborative key management for dynamic groups in mobile networks. Kang, Sukin; Ji, Cheongmin; Hong, Manpyo Report Jan 1, 2014 7119
Certificate-based encryption scheme without pairing. Yao, Ji; Li, Jiguo; Zhang, Yichen Report Jun 1, 2013 6375
Application of new classes of Mersenne primes for fast modular reduction for large-integer multiplication. Sreehari, Suhas; Wu, Huapeng; Ahmadi, Majid Report Jan 1, 2012 3176
Identity--based multiple key agreement scheme. Dehkordi, Massoud Hadian; Alimoradi, Reza Report Dec 1, 2011 4489
Cryptanalysis of a simple three-party key exchange protocol. Debiao, He; Jianhua, Chen; Jin, Hu Report Oct 1, 2010 1932
Public key cryptosystem based on the discrete logarithm problem. Shihadeh, Adullah. A. Report May 1, 2010 3467
An inexpensive device for teaching public key encryption. Pendegraft, Norman Report Sep 22, 2009 2378
An asymmetric key-based security architecture for wireless sensor networks. Haque, Mokammel; Pathan, Al-Sakib Khan; Hong, Choong Seon; Huh, Eui-Nam Report Oct 1, 2008 6786
A new efficient group signature with forward security. Zhang, Jianhong; Wu, Qianhong; Wang, Yumin Oct 1, 2005 3965
On the security of a digital signature with message recovery using self-certified public key. Zhang, Jianhong; Zou, Wei; Chen, Dan; Wang, Yumin Oct 1, 2005 2612
Newly designed VeriSign Trust Mark unveiled. Brief Article Nov 5, 2003 118
Do electronic signatures mean an end to the dotted line? For most Web users, signing a contract online is no big deal. But lawyers must consider the security and enforceability of their e-signatures. Porter, Rebecca Sep 1, 2003 2678
Startup Does PKI Without the Certs. Brief Article Jul 9, 2003 400
Understanding digital signatures. (The CPA and the Computer). Grupe, Fritz; Kerr, Stephen G.; Kuechler, William; Patel, Nilesh Jun 1, 2003 2082
Can PKI live up to its promise of meeting HIPAA requirement? (Viewpoint). Palmer, Pete Apr 1, 2003 950
PKI: the key to enhanced Internet security standards; new panel to give input on implementation and standards. (News & Views). Nov 1, 2002 858
Cryptography. (Technote). Aug 1, 2002 1013
15 security vendors sign-up to EEMA's pki Challenge. (Security News). Aug 1, 2002 226
Protecting your identity; private information theft has become a plague on modern society, but you can protect your business and yourself with the right technology and processes. Groves, Shanna Statistical Data Included May 1, 2002 2401
New security solution now available from RSA Security. Brief Article Dec 20, 2001 122
Rainbow Technologies wins iKey authentication token contract in Australia. Brief Article Dec 5, 2001 119
nCipher and Kyberpass team to provide foundation for secure e-business. Brief Article Oct 9, 2001 159
New company enters Britain's IT security market. Brief Article Sep 24, 2001 134
Most FTSE500 companies have not deployed PKI products - study. Brief Article Aug 29, 2001 135
Most FTSE500 companies have not deployed PKI products - study. Brief Article Aug 29, 2001 148
Use Encryption Services When E-mailing Patients. JANCIN, BRUCE Brief Article Aug 15, 2001 615
ViaCode offers remote troubleshooting for public key infrastructure. Brief Article Aug 14, 2001 151
The trials of PKI. Brief Article Aug 10, 2001 959
Baltimore unveils wireless trust system. Brief Article Jul 24, 2001 128
Computer Associates, nCipher integrate security technologies. Brief Article Jul 11, 2001 123
Diversinet introduces security system for WAP devices. Brief Article Apr 10, 2001 127
Signing With Your Computer. Waegemann, C. Peter Apr 1, 2001 480
I'm Not a Doctor. I Just Play One on the Internet. Scott, Mariah Feb 1, 2001 475
Spanish local government chooses Baltimore Technologies for e-government project. Brief Article Jan 23, 2001 160
Datakey wins contract to supply smart card-based security system to bank. Brief Article Jan 23, 2001 126
Context Systems becomes value added reseller for Keyware's technology. Brief Article Jan 22, 2001 149
Baltimore Technologies introduces new version of UniCERT PKI. Brief Article Jan 15, 2001 185
Two-year PKI security project starts. Brief Article Jan 8, 2001 119
Two-year PKI security project starts. Brief Article Jan 8, 2001 110
Datakey's OEM partners show continued demand for cryptographic technology. Brief Article Jan 4, 2001 150
PKI -- How and Why It Works. Etheridge, Young Jan 1, 2001 1268
Signing Your 011001010. Gelbord, Boaz Dec 1, 2000 1145
Your John Hancock goes digital. Edfors, Patty Dec 1, 2000 760
Thinkpulse and Certplus sign product integration agreement. Brief Article Oct 24, 2000 129
XML and Security. Trusko, Brett Oct 1, 2000 301
E-mail security: The PKI way. Rothman, Mike Oct 1, 2000 615
Entrust wins USD3m contract in from Norway's Telenor. Brief Article Sep 11, 2000 123
PKI: Up Close and Personal. Hemmings, Terry Sep 1, 2000 1817
WebSentry PCI. Sep 1, 2000 171
Algorithmic Research releases portable authentication token. Brief Article Feb 29, 2000 128
Electronic communications. ANDERSON, TERESA Brief Article Feb 1, 2000 115
Risks of PKI: E-Commerce. Ellison, Carl; Schneier, Bruce Feb 1, 2000 777
F-Secure to utilise iD2 Technologies' user authentication technology. Brief Article Jan 1, 2000 127
Eight companies join Radicchio initiative. Brief Article Dec 23, 1999 107
Crunching Internet security codes. Brief Article Oct 2, 1999 195
Factoring with a TWINKLE. I.P. Brief Article Jun 5, 1999 398
Knock, knock ... who's there? Rothman, Mike Jun 1, 1999 1442
Public key crypto. Brief Article Oct 1, 1998 130
Clipping Clipper. Hoffman, Lance J. Column Sep 1, 1993 2496

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters |