ARTÍCULO
TITULO

USING PUBLIC-KEY INFRASTRUCTURES FOR SECURITY AND RISK MANAGEMENT

Wing    
Paul    
O'    
Higgins    
Brian    

Resumen

No disponible

 Artículos similares

       
 
Ivan Chizhov,Elizaveta Popova     Pág. 24 - 33
This paper represents the investigation of McEliece-Sidelnikov cryptosystem, based on combination of random codes with Reed-Muller codes. Different modifications of classical McEliece cryptosystem has been studied. Sidelnikov?s work introduced using the ... ver más

 
Donghoe Heo, Suhri Kim, Young-Ho Park and Seokhie Hong    
In this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. As CSIDH offers a smaller key size than SIDH and provides a relatively efficient signature scheme, numerous CSIDH-based key exchange al... ver más
Revista: Applied Sciences

 
Hugo Solís-Sánchez and E. Gabriela Barrantes    
-
Revista: Information

 
Yu Zhang, Yin Li and Yifan Wang    
-
Revista: Information

 
Jheng-Jia Huang, Yi-Fan Tseng, Qi-Liang Yang and Chun-I Fan    
Authentication has been adopted in many areas, but most of these authentication schemes are built using traditional cryptographic primitives. It is widely believed that such primitives are not resistant to quantum algorithms. To deal with those quantum a... ver más
Revista: Applied Sciences