Tags » Public-key Cryptography

An Efficient Implementation for Key Management Technique Using Smart Card and Ecies Cryptography

An Efficient Implementation Of Key Management Technique Using Smart Card And ECIES Cryptography

Neha Gupta and Harsh Kumar Singh and Anurag Jain, RITS Bhopal, India… 178 more words

Computer Modelling

EB/U2 Topic 3-Cryptography, Public key and Private key Cryptography


Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. 540 more words


Travails of Cryptovirology

Cryptovirology is known as the younger evil sibling of Cryptography. It is a field devoted to the study of using cryptography for designing powerful malicious software. 476 more words