M Anastasova, P Kampanakis, J Massimo - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Public key cryptography is used to asymmetrically establish keys, authenticate or encrypt data between communicating parties at a relatively high performance cost. To reduce …
Cloud computing is an aspired reverie of computing that provides a huge capacity of storage. The users of the cloud, store large volumes of their private data, where sometimes …
YM Nykolaychuk, IZ Yakymenko, NY Vozna… - … and Systems Analysis, 2022 - Springer
Theoretical foundations of asymmetric encryption based on the residue number system and its modified perfect form are developed. The moduli of the residue number system are …
P Mathur, AK Gupta… - Recent Advances in …, 2021 - ingentaconnect.com
Background: Cloud computing is an emerging technique by which anyone can access the applications as utilities over the internet. Cloud computing is the technology which …
P Singh, S Kumar - Int. J. Eng. Technol, 2017 - researchgate.net
Cryptography is about protecting the data from third parties or from public to read confidential data. Cryptography mainly focuses on encrypting the data or we can say …
A Banerjee, A Kundu - Wireless Personal Communications, 2021 - Springer
Authors propose a hardware based approach for reliable encryption in wireless network using Cellular Automata (CA). Distinct layers of encryption have been utilized in proposed …
To reduce communication costs, to protect our data from eavesdropping and from unauthorized users, cryptographic algorithms are used. Cryptographic module has to be …
The cryptography network security means to protect data transmission during their interconnected networks in all over the world. Cryptography network security is the important …
M Melina, AI Hadiana, EK Putra, S Sukono… - AIP Conference …, 2024 - pubs.aip.org
Currently, every electronic transaction involving important information requires a digital signature (DS). The procedure used to prove the authenticity of the DS, the authenticity of …