Tags » Public-key Cryptography

PEC - An Alternate and More Efficient Public Key Cryptosystem

PEC – An Alternate and More Efficient Public Key Cryptosystem

Rahul Krishnan
Mass Academy of Math and Science
85 Prescott Street, Worcester, MA 99999, USA… 165 more words

Cryptographic Protocols

FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED

Factoring Cryptosystem Moduli when the Co-Factors Difference is Bounded

Omar Akchiche and Omar Khadir, University of Hassan, Morocco

ABSTRACT

LET P, Q BE TWO LARGE PRIMES AND N= . 67 more words

An Efficient Implementation for Key Management Technique Using Smart Card and Ecies Cryptography

An Efficient Implementation Of Key Management Technique Using Smart Card And ECIES Cryptography

Neha Gupta and Harsh Kumar Singh and Anurag Jain, RITS Bhopal, India… 178 more words

Computer Modelling

EB/U2 Topic 3-Cryptography, Public key and Private key Cryptography

CRYPTOGRAPHY

Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. 540 more words

Ipu

Travails of Cryptovirology

Cryptovirology is known as the younger evil sibling of Cryptography. It is a field devoted to the study of using cryptography for designing powerful malicious software. 476 more words