of
Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in
Public Key Cryptography, Miami, FL, USA, pp.
Bernstein, "Curve25519: New Diffie-Hellman Speed Records", in
Public Key Cryptography (PKC 2006), Lecture Notes in Computer Science, vol.
Also, ciphering audio and video data
public key cryptography can be performed along with Steganography.
With PCs and smartphones, the TLS cryptographic protocol, which employs
public key cryptography, is widely used to prevent identity fraud, data theft, and tampering in communications.
The second panel discussed IBE's relative strengths and weaknesses compared to traditional
public key cryptography, and included panelists with expertise in IBE and public key infrastructure (PKI).
Boldyreva, "Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme," in
Public Key Cryptography: PKC 2003, vol.
Cambridge-based Signify delivers managed service Two-Factor Authentication (2FA) using both
public key cryptography algorithm (RSA) technology and its own Passcode OnDemand software.
Batten (mathematics, Deakin U., Australia) presents a textbook for a course of one or two semesters in
public key cryptography in the context of information technology security.
On usage of
public key cryptography, the efficient algorithm RSA comes under concern because it is reliable and secure when compared to other public key cryptographic systems.
In this paper, based on certificateless
public key cryptography (CL-PKC) [15], we propose a certificateless authentication scheme without bilinear pairing in healthcare system on WMSN.