EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Public-key cryptosystem"
Narrow search

Narrow search

Year of publication
Subject
All
Cloud Computing 1 Cloud computing 1 Computational Complexity 1 Data protection 1 Data security 1 Datenschutz 1 Datensicherheit 1 Elliptic Curve Public Key Cryptosystem 1 Hamming Distance 1 Information management 1 Informationsmanagement 1 Integer Lattice and Q-ary Lattice 1 Irreducible polynomial 1 Mathematics 1 Mathematik 1 Modern Cryptography 1 Modular exponentiation 1 Montgomery multiplication 1 NTRU Cryptosystem and Ajtai/Dwork Cryptosystem 1 Optimal Code Theory 1 Programmable cellular automata 1 Public-key cryptosystem 1 RSA 1 Shannon Theorem 1 Source Coding Theorem 1 Statistical Characteristics of Cryptosystem 1 Theorie 1 Theory 1 cloud computing 1 cryptanalysis 1 cryptography 1 data confidentiality 1 data outsourcing 1 data security 1 decryption 1 encryption 1 key exchange 1 public key cryptosystem 1
more ... less ...
Online availability
All
Undetermined 2
Type of publication
All
Article 2 Book / Working Paper 1
Type of publication (narrower categories)
All
Article in journal 1 Aufsatz in Zeitschrift 1
Language
All
English 2 Undetermined 1
Author
All
Jeon, Jun-Cheol 1 Thangavel, M. 1 Varalakshmi, P. 1 Yoo, Kee-Young 1 Zheng, Zhiyong 1
Published in...
All
Financial Mathematics and Fintech 1 International journal of information systems and change management : IJISCM 1 Mathematics and Computers in Simulation (MATCOM) 1 Springer eBook Collection 1
Source
All
ECONIS (ZBW) 2 RePEc 1
Showing 1 - 3 of 3
Cover Image
Modern Cryptography Volume 1 : A Classical Introduction to Informational and Mathematical Principle
Zheng, Zhiyong - 2022
Chapter 1. Preparatory knowledge -- Chapter 2. The basis of code theory -- Chapter 3. Shannon theory -- Chapter 4. Cryptosystem and authentication system -- Chapter 5. Prime test -- Chapter 6. Elliptic curve -- Chapter 7. Lattice-based cryptography.
Persistent link: https://www.econbiz.de/10013176820
Saved in:
Cover Image
Improved secure RSA crytosystem for data confidentiality in cloud
Thangavel, M.; Varalakshmi, P. - In: International journal of information systems and change … 9 (2017) 4, pp. 261-277
Persistent link: https://www.econbiz.de/10011858355
Saved in:
Cover Image
Montgomery exponent architecture based on programmable cellular automata
Jeon, Jun-Cheol; Yoo, Kee-Young - In: Mathematics and Computers in Simulation (MATCOM) 79 (2008) 4, pp. 1189-1196
combining the characteristics of the irreducible AOP and PCA. The proposed architecture can be efficiently used for public-key … cryptosystem. …
Persistent link: https://www.econbiz.de/10010870168
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...