Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,079,835 papers from all fields of science
Search
Sign In
Create Free Account
Hybrid cryptosystem
Known as:
Hybrid encryption
In cryptography, a hybrid cryptosystem is one which combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Cryptography
History of cryptography
PKCS
Public-key cryptography
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A lightweight hybrid encryption technique to secure IoT data transmission
Tenzin Kunchok
,
Prof Kirubanand V. B
2018
Corpus ID: 55802406
Internet of Things(IOT) is the rising innovation without bounds is required to associate billions of devices. IoT is the future…
Expand
2015
2015
An Authentication Framework for Multi-Domain Machine-to-Machine Communication in Cyber-Physical Systems
Shuo Chen
,
M. Ma
,
Zhenxing Luo
IEEE Globecom Workshops (GC Wkshps)
2015
Corpus ID: 9209296
In the near future, the cyber-physical system (CPS), will have all the objects in the cyber world and the physical world…
Expand
2014
2014
ENHANCING SECURITY IN CLOUD COMPUTING STRUCTURE BY HYBRID ENCRYPTION
Aparjita Sidhu
,
R. Mahajan
2014
Corpus ID: 61410913
Modern communication is containing different types of networks depending on the behavior of users. Cloud network and services are…
Expand
2013
2013
Substation Communication Security Research Based on Hybrid Encryption of DES and RSA
Fangfang Wang
,
Huazhong Wang
,
Dongqing Chen
,
Peng Yong
Ninth International Conference on Intelligent…
2013
Corpus ID: 16934598
Real time performance is in rigorous demand in substation. IEC 61850, the only international standard in substation automation…
Expand
2013
2013
A Hybrid Encryption Scheme using DNA Technology
Grasha Jacob
,
A. Murugan
2013
Corpus ID: 189921103
Sensitive information such as financial transactions, medical and personal records are transmitted through public communication…
Expand
2010
2010
How to Strengthen the Security of RSA-OAEP
A. Boldyreva
,
H. Imai
,
K. Kobara
IEEE Transactions on Information Theory
2010
Corpus ID: 731723
OAEP is one of the few standardized and widely deployed public-key encryption schemes. It was designed by Bellare and Rogaway as…
Expand
2009
2009
A design of security protocol using hybrid encryption technique (AES-Rijndael and RSA)
E. Ramaraj
,
S. Karthikeyan
,
M. Hemalatha
2009
Corpus ID: 64879392
This paper aims to design the new security protocol using hybrid encryption technique for on line transaction. The hybrid…
Expand
2009
2009
Efficient Certificateless KEM in the Standard Model
G. Lippold
,
C. Boyd
,
J. G. Nieto
International Conference on Information Security…
2009
Corpus ID: 12978517
We give a direct construction of a certificateless key encapsulation mechanism (KEM) in the standard model that is more efficient…
Expand
2007
2007
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
J. Birkett
,
A. Dent
,
G. Neven
,
Jacob C. N. Schuldt
Australasian Conference on Information Security…
2007
Corpus ID: 7930808
We propose new instantiations of chosen-ciphertext secure of identity-based encryption schemes with wildcards (WIBE). Our schemes…
Expand
1988
1988
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Gérard Cohen
,
Marc Giusti
,
T. Mora
Lecture Notes in Computer Science
1988
Corpus ID: 1816878
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE