Post Quantum Public and Private Key Cryptography Optimized for IoT Security.
Ajay KaushikLakshmi Sai Srikar VadlamaniMohammed Mohsin HussainMilind SahayRahul SinghAnanya Komal SinghS. InduPuneet GoswamiNalliyanna Goundar Veerappan KousikPublished in: Wirel. Pers. Commun. (2023)
Keyphrases
- private key
- public key
- public key cryptography
- security analysis
- key distribution
- key management
- signature scheme
- secret key
- image encryption
- digital signature
- information security
- secret sharing scheme
- encryption scheme
- diffie hellman
- security model
- ciphertext
- encryption algorithms
- mutual authentication
- authentication scheme
- signcryption scheme
- smart card
- security properties
- security requirements
- rfid tags
- cloud computing
- rfid systems
- network security