Výsledky vyhledávání - "asymmetric encryption/decryption algorithm"

  • Zobrazuji výsledky 1 - 6 z 6
Upřesnit hledání
  1. 1

    Ensuring Cybersecurity of Data Transmission in Limited Energy Consumption Networks Autor Krasnov, A.N., Prakhova, M.Yu, Novikova, U.V.

    Vydáno: IEEE 06.10.2020
    “…In the northern gas fields, most data are transmitted via wireless networks, which requires special transmission security measures. Herewith, the gas field…”
    Získat plný text
    Konferenční příspěvek
  2. 2

    Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain Autor Xu, Shiwei, Sun, Ao, Ren, Zhengwei, Zhao, Yizhi, Ni, Qiufen, Tong, Yan

    ISSN: 1382-6905, 1573-2886
    Vydáno: United States Springer US 01.01.2023
    Vydáno v Journal of combinatorial optimization (01.01.2023)
    “… However, current key escrow schemes rely on vulnerable traditional asymmetric encryption/decryption algorithms…”
    Získat plný text
    Journal Article
  3. 3

    A Data Encryption Solution for Mobile Health Apps in Cooperation Environments Autor Silva, Bruno M, Rodrigues, Joel JPC, Canelo, Fábio, Lopes, Ivo C, Zhou, Liang

    ISSN: 1438-8871, 1439-4456, 1438-8871
    Vydáno: Canada Journal of Medical Internet Research 01.04.2013
    Vydáno v Journal of medical Internet research (01.04.2013)
    “…Mobile Health (mHealth) proposes health care delivering anytime and anywhere. It aims to answer several emerging problems in health services, including the…”
    Získat plný text
    Journal Article
  4. 4

    RETRACTED ARTICLE: Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain Autor Xu, Shiwei, Sun, Ao, Ren, Zhengwei, Zhao, Yizhi, Ni, Qiufen, Tong, Yan

    ISSN: 1382-6905, 1573-2886
    Vydáno: New York Springer US 01.07.2023
    Vydáno v Journal of combinatorial optimization (01.07.2023)
    “… However, current key escrow schemes rely on vulnerable traditional asymmetric encryption/decryption algorithms…”
    Získat plný text
    Journal Article
  5. 5

    Polynomial Rabin Cryptosystem Based on the Operation of Addition Autor Yakymenko, Igor, Kasianchuk, Mykhailo, Shylinska, Inna, Shevchuk, Ruslan, Yatskiv, Vasyl, Karpinski, Mikolaj

    ISBN: 9781665410496, 1665410493
    ISSN: 2770-5218
    Vydáno: IEEE 26.09.2022
    “…The analysis of the existing asymmetric encryption / decryption algorithms is carried out, their advantages and disadvantages are determined on the basis of this analysis in the paper…”
    Získat plný text
    Konferenční příspěvek
  6. 6

    Concurrent error detection and correction in dual basis multiplier over GF(2 m ) Autor Chiou, C.W., Lee, C.-Y., Lin, J.-M., Hou, T.-W., Chang, C.-C.

    ISSN: 1751-858X, 1751-8598
    Vydáno: Stevenage Institution of Engineering and Technology 01.02.2009
    Vydáno v IET circuits, devices & systems (01.02.2009)
    “…Fault-based side-channel cryptanalysis is a useful technique against symmetrical and asymmetrical encryption/decryption algorithms…”
    Získat plný text
    Journal Article