ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Religion
Social Sciences
Sports
Economy
Law
Public health
Research
Technology
Administration - Business
all records (73)

Languages
English
Spanish
Portuguese
German
French

Countries
Indonesia
Brazil
South Africa
USA
Poland
Spain
Canada
Italy
Ukraine
Colombia
all records (71)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
186.333  Articles
1 of 18.634 pages  |  10  records  |  more records»
Public key cryptosystems are secure only when the authenticity of the public key is assured. Shao proposeda new scheme to overcome the problems of the existing schemes, which suffers from two major drawbacks. Thefirst drawback is the availability of users... see more

All the current public-key cryptosystems will become insecure when size of a quantum register is sufficient. An authenticated key agreement protocol, which is against the attack of quantum computer, is proposed. The proposed protocol can provide the secur... see more

This paper represents the investigation of McEliece-Sidelnikov cryptosystem, based on combination of random codes with Reed-Muller codes. Different modifications of classical McEliece cryptosystem has been studied. Sidelnikov’s work introduced using the s... see more

The authors propose an algorithm for recovering the secret key of the M?Eliece–Sidelnikov cryptosystem in general case: with u ? N copies of the Reed–Muller codes. Recovering the secret key of the McEliece–Sidelnikov cryptosystem is re... see more

Modular inversion with large integers and modulus is a fundamental operation in many public-key cryptosystems. Extended Euclidean algorithm (XGCD) is an extension of Euclidean algorithm (GCD) used to compute the modular multiplicative inverse of two copri... see more

Data protection is representing a huge trade in the modern era; the vast communication development gave this field increased attention from all sorts of parties (friends and foes); integral transforms have played a decent role in many methods that are pro... see more

Searchable encryption allows a remote server to search over encrypted documents without knowing the sensitive data contents. Prior searchable symmetric encryption schemes focus on single keyword search. Conjunctive Keyword Searches (CKS) schemes improve s... see more

AbstractThis article introduces a unique model for public theological conversation and discourse, which was developed by the Concerned Black Clergy of Atlanta (CBC). It was a model developed in response to the problems of poverty, homelessness, and the ‘... see more

1 of 18.634 pages  |  10  records  |  more records»