Demystifying public key cryptography

被引:0
|
作者
Wasilewski, T.
机构
来源
CED (Denver, CO) | / 22卷 / 05期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] On Multiple Encryption for Public-Key Cryptography
    Soroceanu, Tudor
    Buchmann, Nicolas
    Margraf, Marian
    CRYPTOGRAPHY, 2023, 7 (04)
  • [32] SUBSETS OF GROUPS IN PUBLIC-KEY CRYPTOGRAPHY
    Carvalho, Andre
    Malheiro, Antonio
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2025, 19 (03) : 980 - 995
  • [33] Using Decision Problems in Public Key Cryptography
    Shipilrain, Vladimir
    Zapata, Gabriel
    GROUPS COMPLEXITY CRYPTOLOGY, 2009, 1 (01) : 33 - 49
  • [34] The basics of public key cryptography and digital signatures
    Greenwood, D
    TOWARD AN ELECTRONIC PATIENT RECORD '97 - CONFERENCE AND EXPOSITION, PROCEEDINGS, VOLS 1-3, 1997, : A128 - A131
  • [35] Public-key cryptography on smart cards
    Fuchsberger, A
    Gollmann, D
    Lothian, P
    Paterson, KG
    Sidiropoulos, A
    CRYPTOGRAPHY: POLICY AND ALGORITHMS, 1996, 1029 : 250 - 269
  • [36] Accelerating Public Key Cryptography in Android Platforms
    Ou, Wei
    Guo, Wei
    Hang, Feilu
    Xie, Linjiang
    Tang, Xuyue
    Fang, Ning
    Xian, Hequn
    5TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM 2019), 2019, : 245 - 249
  • [37] Public Key Code Cryptography Processor.
    Sedlak, Holger
    Golze, Ulrich
    Informationstechnik it: Computer, Systeme, Anwendungen, 1986, 28 (03): : 157 - 161
  • [38] Combinatorial Group Theory and Public Key Cryptography
    Vladimir Shpilrain
    Gabriel Zapata
    Applicable Algebra in Engineering, Communication and Computing, 2006, 17 : 291 - 302
  • [39] Compliance defects in public-key cryptography
    Davis, D
    PROCEEDINGS OF THE SIXTH ANNUAL USENIX SECURITY SYMPOSIUM: FOCUSING ON APPLICATIONS OF CRYPTOGRAPHY, 1996, : 171 - 178
  • [40] Teaching Public-Key Cryptography in School
    Keller, Lucia
    Komm, Dennis
    Serafini, Giovanni
    Sprock, Andreas
    Steffen, Bjoern
    TEACHING FUNDAMENTAL CONCEPTS OF INFORMATICS, PROCEEDINGS, 2010, 5941 : 112 - 123