Search

Search Results

Showing 1-20 of 30,873 results
  1. Chapter

    Cryptography and Public Key Infrastructure

    Cryptography is essential to information security, providing the mechanisms to secure data confidentiality, integrity, authentication, and...
    2025
  2. Article

    A hybrid public cryptography based group key generation for sensitive attribute protection in medical health care systems

    Cloud computing is an extraordinary innovation for giving information storage facilities with productive storage, maintenance, management, and remote...

    S. Vinothkumar, J. Amutharaj in International Journal of Information Technology
    07 December 2024
  3. Chapter

    Introduction to Public-Key Cryptography

    As we start to learn about public-key cryptography, let’s recall that the term publickey cryptography is used interchangeably with asymmetric...
    Christof Paar, Jan Pelzl, Tim Güneysu in Understanding Cryptography
    2024
  4. Article

    An approach for designing fast public key encryption systems using white-box cryptography techniques

    I present an approach for designing fast public key encryption cryptosystems using random primitives, white-box cryptography techniques and...

    10 February 2024
  5. Conference proceedings

    Public-Key Cryptography – PKC 2025 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12–15, 2025, Proceedings, Part III

    The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public...

    Tibor Jager, Jiaxin Pan in Lecture Notes in Computer Science
    2025
  6. Conference proceedings

    Public-Key Cryptography – PKC 2025 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12–15, 2025, Proceedings, Part V

    The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public...

    Tibor Jager, Jiaxin Pan in Lecture Notes in Computer Science
    2025
  7. Conference proceedings

    Public-Key Cryptography – PKC 2025 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12–15, 2025, Proceedings, Part II

    The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public...

    Tibor Jager, Jiaxin Pan in Lecture Notes in Computer Science
    2025
  8. Conference proceedings

    Public-Key Cryptography – PKC 2025 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12–15, 2025, Proceedings, Part I

    The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public...

    Tibor Jager, Jiaxin Pan in Lecture Notes in Computer Science
    2025
  9. Conference proceedings

    Public-Key Cryptography – PKC 2025 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12–15, 2025, Proceedings, Part IV

    The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public...

    Tibor Jager, Jiaxin Pan in Lecture Notes in Computer Science
    2025
  10. Article

    Post-quantum anonymous password authenticated key exchange with indirect public key validation

    As mobile devices become integral to daily life, ensuring secure communication between these devices and servers is crucial for protecting sensitive...

    Mohammad Reza Saeidi, Hamid Mala in The Journal of Supercomputing
    10 September 2025
  11. Conference proceedings

    Public-Key Cryptography – PKC 2024 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings, Part II

    The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and...

    Qiang Tang, Vanessa Teague in Lecture Notes in Computer Science
    2024
  12. Conference proceedings

    Public-Key Cryptography – PKC 2024 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings, Part I

    The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and...

    Qiang Tang, Vanessa Teague in Lecture Notes in Computer Science
    2024
  13. Conference proceedings

    Public-Key Cryptography – PKC 2024 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings, Part IV

    The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and...

    Qiang Tang, Vanessa Teague in Lecture Notes in Computer Science
    2024
  14. Conference proceedings

    Public-Key Cryptography – PKC 2024 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings, Part III

    The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and...

    Qiang Tang, Vanessa Teague in Lecture Notes in Computer Science
    2024
  15. Article

    IoT cryptography with privacy-preserving ElGamal public key cryptosystem using oppositional artificial flora optimization algorithm

    Privacy and security have received significant interest among the research communities Due to the increased exploitation of the Internet of Things...

    Devi Paramasivam, Sathyalakshmi Sivaji, ... Abdullah Saleh Alqahtani in Multimedia Tools and Applications
    09 May 2024
  16. Chapter

    Alice and Bob and Whit and Martin: Public-Key Cryptography

    The key exchange problemKeyexchange problem occurs with symmetric cipherSymmetric cipher systems because the same key is used for both enciphering...
    2024
  17. Conference proceedings

    Public-Key Cryptography – PKC 2023 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I

    The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International Conference on Practice and...
    Alexandra Boldyreva, Vladimir Kolesnikov in Lecture Notes in Computer Science
    2023
  18. Conference proceedings

    Public-Key Cryptography – PKC 2023 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II

    The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International Conference on Practice and...
    Alexandra Boldyreva, Vladimir Kolesnikov in Lecture Notes in Computer Science
    2023
  19. Article
    Full access

    Quantum computing empowering blockchain technology with post quantum resistant cryptography for multimedia data privacy preservation in cloud-enabled public auditing platforms

    The multimedia environment has undergone significant growth, particularly in the area of multimedia data and its migration to cloud platforms, which...

    Abdullah Ayub Khan, Asif Ali Laghari, ... Sajid Ullah in Journal of Cloud Computing
    13 August 2025 Open access
Did you find what you were looking for? Share feedback.