Public key cryptography

Public key programs

Distributed Computing / Privacy / RFID / Ad Hoc Networks / Radio Frequency Identification / Temporal Information Extraction / Public key cryptography / Electrical And Electronic Engineering / Privacy Preservation / Rfid Tag / Temporal Information Extraction / Public key cryptography / Electrical And Electronic Engineering / Privacy Preservation / Rfid Tag

McEliece public key cryptosystems using algebraic-geometric codes

Information Theory / Pure Mathematics / Propulsion / Gaussian processes / Public key cryptography / Decoding / Linear Code / Galois Fields / Electrical And Electronic Engineering / Application Software / Public Key Cryptosystem / Decoding / Linear Code / Galois Fields / Electrical And Electronic Engineering / Application Software / Public Key Cryptosystem

Quasi-Cyclic Low-Density Parity-Check Codes in the McEliece Cryptosystem

Artificial Intelligence / Telecommunications / Cryptography / LDPC / Public key cryptography / Decoding

Análisis de Primitivas Criptográficas para Redes de Sensores

Information Exchange / Software Implementation / Public key cryptography / Communication Channels / Wireless Sensor Network / Sensor nodes / Hash Function / Sensor nodes / Hash Function

A secure remote database backup system

Data Security / Public key cryptography

Access control meets public key infrastructure, or: Assigning roles to strangers

Business / Logic Programming / Public Key Infrastructure / Access Control / Trust Management / Authentication / Key Management / Public key cryptography / Authorisation / Certification / Web Server / Bottom Up / Role Based Access Control / Internet / X / Electronic Commerce / Message Authentication / Authentication / Key Management / Public key cryptography / Authorisation / Certification / Web Server / Bottom Up / Role Based Access Control / Internet / X / Electronic Commerce / Message Authentication

Análisis de Primitivas Criptográficas para Redes de Sensores

Information Exchange / Software Implementation / Public key cryptography / Communication Channels / Wireless Sensor Network / Sensor nodes / Hash Function / Sensor nodes / Hash Function

Análisis de Primitivas Criptográficas para Redes de Sensores

Information Exchange / Software Implementation / Public key cryptography / Communication Channels / Wireless Sensor Network / Sensor nodes / Hash Function / Sensor nodes / Hash Function

A nonlinear cryptosystem based on elliptic curves

Public key cryptography / Elliptic Curve Cryptography / Finite Field / Key Agreement

Digital Signatures for Centralized DSA Networks

Digital Signature / Cryptography / Cognitive radio / Key Management / Radio Frequency / Resource Management / Public key cryptography / Spectrum / Digital Signatures / Boolean Satisfiability / Denial of Service Attack / Resource Management / Public key cryptography / Spectrum / Digital Signatures / Boolean Satisfiability / Denial of Service Attack

FPGA Montgomery Multiplier Architectures - A Comparison

Information Technology / Field-Programmable Gate Arrays / Elliptic curves / Hardware / Public key cryptography / Carry Look-ahead Adder / Elliptic Curve Cryptography / Montgomery multiplication / FPGA Architecture / Carry Look-ahead Adder / Elliptic Curve Cryptography / Montgomery multiplication / FPGA Architecture

A Novel Processor Architecture for McEliece Cryptosystem and FPGA Platforms

Quantum Computing / FPGA / Field-Programmable Gate Arrays / Processor Architecture / Hardware / Public key cryptography / Decoding / High performance / Encoding / Embedded System / Public Key Cryptosystem / Public key cryptography / Decoding / High performance / Encoding / Embedded System / Public Key Cryptosystem

Improved Merkle Cryptosystem (IMC)

Computer Security / Cryptography / Encryption / Text / IT Security / Public key cryptography / Hashing / Utility Computing / Cryptographic Hash Function / Key Agreement / Key Establishment / Public Key Cryptosystem / Information System / Public key cryptography / Hashing / Utility Computing / Cryptographic Hash Function / Key Agreement / Key Establishment / Public Key Cryptosystem / Information System

Quasi-cyclic low-density parity-check codes in the McEliece cryptosystem

Artificial Intelligence / Telecommunications / Cryptography / LDPC / Public key cryptography / Decoding

A Smart approach for GPT cryptosystem based on rank codes

Physics / Information Theory / Public key cryptography / Decoding / Robustness / Polynomials

Type-based distributed access control

Access Control / Public key cryptography / Authorisation / Type System / Information Flow Control
Copyright © 2017 DADOSPDF Inc.