Search Results - "PUBLIC key cryptography"
-
1
Authors: et al.
Source: ACM Computing Surveys. Oct2025, Vol. 57 Issue 10, p1-36. 36p.
-
2
Authors: Gagneja, Kunal1 (AUTHOR) kunal.gagneja@gmail.com
Source: AIP Conference Proceedings. 10/31/2025, Vol. 3343 Issue 1, p1-6. 6p.
-
3
Authors:
Source: Journal of the ACM. Jun2024, Vol. 71 Issue 3, p1-50. 50p.
Subject Terms: *DIGITAL signatures, *PUBLIC key cryptography, RSA algorithm
-
4
Authors: CLOSE, DAVID1 feedbackvnd@cybermedia.co.in
Source: Voice & Data. Aug2025, Vol. 32 Issue 8, p66-69. 4p.
Subject Terms: *PUBLIC key cryptography, *INFRASTRUCTURE (Economics), *DIGITAL certificates, *DIGITAL signatures, RADIO access networks, DIGITAL technology, COMPUTER firmware
-
5
Authors:
Source: PLoS ONE. 11/11/2025, Vol. 20 Issue 11, p1-29. 29p.
Subject Terms: *CRYPTOGRAPHY, *PUBLIC key cryptography, *FIELD programmable gate arrays, *RESOURCE allocation, *DATA pipelining, *ALGORITHMS
-
6
Authors:
Source: International Journal of Image & Graphics. Nov2025, Vol. 25 Issue 6, p1-48. 48p.
Subject Terms: *ELLIPTIC curve cryptography, *PUBLIC key cryptography, *DATA encryption, *INTERNET of things, *ARITHMETIC, *BLOCKCHAINS, *DECODING algorithms
-
7
Authors: Fuyuki Kitagawa1
Source: NTT Technical Review. Oct2025, Vol. 23 Issue 10, p14-19. 6p.
Subject Terms: *PUBLIC key cryptography, *QUANTUM computers, *COMPUTER network security, *QUANTUM cryptography, *DATA encryption, *LABORATORIES, *CYBERTERRORISM
-
8
Authors:
Source: Communications of the ACM. Mar2024, Vol. 67 Issue 3, p97-105. 9p.
-
9
Authors: et al.
Source: Mathematics (2227-7390). Sep2025, Vol. 13 Issue 17, p2841. 43p.
Subject Terms: *CRYPTOGRAPHY, *PUBLIC key cryptography, *SECURITY management, *CRYPTOSYSTEMS
Company/Entity: NATIONAL Institute of Standards & Technology (U.S.)
-
10
Authors:
Source: Cluster Computing. Aug2025, Vol. 28 Issue 4, p1-22. 22p.
-
11
Authors: et al.
Source: Scientific Reports. 7/28/2025, Vol. 15 Issue 1, p1-14. 14p.
Subject Terms: *PUBLIC key cryptography, *CLOUD computing, *LATTICE theory, *DATA encryption, *SECURITY management, *CRYPTOGRAPHY, *DATA management
-
12
Authors: et al.
Source: Sensors (14248220). Jul2025, Vol. 25 Issue 14, p4286. 15p.
Subject Terms: *CHEBYSHEV polynomials, *PUBLIC key cryptography, *AUTHENTICATION (Law), *CRYPTOGRAPHY, *INTERNET of things, *COMPUTATIONAL complexity
-
13
Authors: et al.
Source: European Journal of Pure & Applied Mathematics. Jul2025, Vol. 18 Issue 3, p1-16. 16p.
-
14
Authors:
Source: JOURNAL OF CRYPTOGRAPHIC ENGINEERING. 15(1)
Subject Terms: Public key cryptography, Post-quantum cryptography, CRYSTALS-Kyber, LWE/LWR-based KEM, Side-channel attack, Deep learning
File Description: print
-
15
Authors: Silva Velón, Javier
Contributors: University/Department: Universitat Pompeu Fabra. Departament de Tecnologies de la Informació i les Comunicacions
Thesis Advisors: Ràfols, Carla
Source: TDX (Tesis Doctorals en Xarxa)
Subject Terms: Proof systems, Zero-knowledge proofs, Falsi able assumptions, Isogenies, Public-key cryptography, Sistemes de prova, Proves de coneixement nul, Hipòtesis falsificables, Isogènies, Criptografia de clau pública
File Description: application/pdf
Access URL: http://hdl.handle.net/10803/671222
-
16
Authors:
Source: Communications of the ACM. Jun2023, Vol. 66 Issue 6, p107-115. 9p. 1 Black and White Photograph, 2 Charts, 3 Graphs.
Subject Terms: *PUBLIC key cryptography, EMAIL security, CIPHERS, PRIVACY, LOGARITHMS
-
17
Authors: et al.
Source: Symmetry (20738994). Jun2025, Vol. 17 Issue 6, p881. 13p.
Subject Terms: *PUBLIC key cryptography, *VIRTUAL private networks, *POLYNOMIAL time algorithms, *SMART cards, *QUANTUM computing, *QUANTUM cryptography
-
18
Authors: et al.
Source: Cryptography (2410-387X). Jun2025, Vol. 9 Issue 2, p46. 24p.
Subject Terms: *PUBLIC key cryptography, *MULTIPLICATION, *ELLIPTIC curve cryptography, *MODULAR arithmetic, *SCHOLARLY method
-
19
Authors: et al.
Source: PLoS ONE. 5/28/2025, Vol. 20 Issue 5, p1-32. 32p.
-
20
Authors:
Source: Cybernetics & Systems Analysis. May2025, Vol. 61 Issue 3, p521-526. 6p.
Subject Terms: *PUBLIC key cryptography, *MODULAR arithmetic, *ARITHMETIC, *MULTIPLICATION, *INTEGRATED circuits
Full Text Finder
Nájsť tento článok vo Web of Science