Articles with "asymmetric encryption" as a keyword



Photo by jordanharrison from unsplash

RF Simulations for AAβ Cryptosystem, an Asymmetric Encryption Scheme

Sign Up to like & get
recommendations!
Published in 2018 at "Indonesian Journal of Electrical Engineering and Computer Science"

DOI: 10.11591/ijeecs.v11.i2.pp542-548

Abstract: Internet of Things (IoT) is a way of providing data with the physical thing that interconnected to the network, which is the Internet. The IoT devices connected to the internet, broadcast of the data to… read more here.

Keywords: simulations cryptosystem; encryption scheme; asymmetric encryption; scheme ... See more keywords
Photo by christianw from unsplash

Asymmetric encryption by optical Kerr nonlinearities exhibited by electrochromic NiO thin films.

Sign Up to like & get
recommendations!
Published in 2022 at "Optics express"

DOI: 10.1364/oe.456255

Abstract: Herein is analyzed how an electric field can induce a band gap shift in NiO films to generate an enhancement in their third-order optical nonlinearities. An electrochromic effect seems to be responsible for changes in… read more here.

Keywords: optical kerr; kerr; encryption optical; asymmetric encryption ... See more keywords
Photo from wikipedia

A Novel Digital Signature Scheme for Advanced Asymmetric Encryption Techniques

Sign Up to like & get
recommendations!
Published in 2023 at "Applied Sciences"

DOI: 10.3390/app13085172

Abstract: Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove their robustness,… read more here.

Keywords: signature; encryption; digital signature; scheme ... See more keywords