Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Batch cryptography

Batch cryptography is the area of cryptology where cryptographic protocols are studied and developed for doing cryptographic processes like… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Secure access is one of the fundamental problems in mobile computing. Digital signature is a widely used technique to protect… Expand
Is this relevant?
2017
2017
Secure access is one of the fundamental problems in wireless mobile networks. Digital signature is a widely used technique to… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
2017
2017
Batch cryptography technique is a powerful tool to reduce verification time. There will be two directions to apply the batch… Expand
  • figure 4.1
  • figure 4.2
  • figure 4.4
Is this relevant?
2016
2016
In view of simplifying certificate management complexities in the traditional Public Key Cryptography (PKC) and to abolish the… Expand
Is this relevant?
2015
2015
Digital signature has been widely employed in wireless mobile networks to ensure the authenticity of messages and identity of… Expand
  • figure 1
  • figure 2
  • table I
  • table II
  • table III
Is this relevant?
2011
2011
Batch cryptography has been developed into two main branches-batch verification and batch identification. Batch verification is a… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 2
  • table 1
Is this relevant?
2011
2011
Batch cryptography has been developed into two main branches - batch verification and batch identification. Batch verification is… Expand
  • table 2
Is this relevant?
2000
2000
The material presented in this thesis may be viewed as comprising two key parts, the first part concerns batch cryptography… Expand
  • figure 2.1
  • table 2.1
  • figure 2.5
  • figure 2.7
  • figure 2.9
Is this relevant?
1999
1999
All known anonymous electronic cash protocols are inefficient compared to other electronic payment protocols. This is because… Expand
Is this relevant?
1999
1999
We propose a non-divisible electronic cash system that combines the restrictive blind signature technique and a batch signature… Expand
Is this relevant?