Search
Search Results
-
Cryptography and Public Key Infrastructure
Cryptography is essential to information security, providing the mechanisms to secure data confidentiality, integrity, authentication, and... -
A hybrid public cryptography based group key generation for sensitive attribute protection in medical health care systems
Cloud computing is an extraordinary innovation for giving information storage facilities with productive storage, maintenance, management, and remote...
-
Introduction to Public-Key Cryptography
As we start to learn about public-key cryptography, let’s recall that the term publickey cryptography is used interchangeably with asymmetric... -
-
An approach for designing fast public key encryption systems using white-box cryptography techniques
I present an approach for designing fast public key encryption cryptosystems using random primitives, white-box cryptography techniques and...
-
Public-Key Cryptography – PKC 2025 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12–15, 2025, Proceedings, Part III
The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public...
-
Public-Key Cryptography – PKC 2025 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12–15, 2025, Proceedings, Part V
The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public...
-
Public-Key Cryptography – PKC 2025 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12–15, 2025, Proceedings, Part II
The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public...
-
Public-Key Cryptography – PKC 2025 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12–15, 2025, Proceedings, Part I
The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public...
-
Public-Key Cryptography – PKC 2025 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12–15, 2025, Proceedings, Part IV
The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public...
-
Post-quantum anonymous password authenticated key exchange with indirect public key validation
As mobile devices become integral to daily life, ensuring secure communication between these devices and servers is crucial for protecting sensitive...
-
Public-Key Cryptography – PKC 2024 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings, Part II
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and...
-
Public-Key Cryptography – PKC 2024 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings, Part I
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and...
-
Public-Key Cryptography – PKC 2024 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings, Part IV
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and...
-
Public-Key Cryptography – PKC 2024 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings, Part III
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and...
-
IoT cryptography with privacy-preserving ElGamal public key cryptosystem using oppositional artificial flora optimization algorithm
Privacy and security have received significant interest among the research communities Due to the increased exploitation of the Internet of Things...
-
Alice and Bob and Whit and Martin: Public-Key Cryptography
The key exchange problemKeyexchange problem occurs with symmetric cipherSymmetric cipher systems because the same key is used for both enciphering... -
Public-Key Cryptography – PKC 2023 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I
The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International Conference on Practice and... -
Public-Key Cryptography – PKC 2023 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II
The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International Conference on Practice and... -
Quantum computing empowering blockchain technology with post quantum resistant cryptography for multimedia data privacy preservation in cloud-enabled public auditing platforms
The multimedia environment has undergone significant growth, particularly in the area of multimedia data and its migration to cloud platforms, which...