-
181
A novel method for developing post-quantum cryptoschemes and a practical signature algorithm
Published 2025-01-01Subjects: Get full text
Article -
182
Host’s source address verification based on stream authentication in the IPv6 access subnet
Published 2013-01-01Subjects: Get full text
Article -
183
Efficient traceable identity-based signature scheme
Published 2009-01-01Subjects: “…identity-based cryptography…”
Get full text
Article -
184
Security analysis of public-key cryptosystems based on matrix action problem against quantum attack
Published 2023-03-01Subjects: Get full text
Article -
185
A Survey of Post-Quantum Cryptography Migration in Vehicles
Published 2025-01-01Subjects: “…Post-quantum cryptography (PQC)…”
Get full text
Article -
186
Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption
Published 2025-01-01Subjects: “…quantum cryptography…”
Get full text
Article -
187
Research on algorithm for raster map multi-level sharing based on region incrementing color visual cryptography
Published 2019-09-01Subjects: “…region incrementing visual cryptography…”
Get full text
Article -
188
Coexistence Demonstration and Wavelength Dependency Analysis of S-Band CV-QKD Signal with Fully Loaded C+L-Band DWDM Signals
Published 2025-01-01Subjects: “…quantum cryptography…”
Get full text
Article -
189
Post-quantum encryption technology based on BRLWE for internet of things
Published 2022-10-01Subjects: “…post-quantum cryptography…”
Get full text
Article -
190
Quantum Private Comparison Protocol with Cluster States
Published 2025-01-01Subjects: Get full text
Article -
191
Fault analysis on elliptic curve cryptosystems with sliding window method
Published 2012-01-01Subjects: “…public key cryptography…”
Get full text
Article -
192
Efficient certificateless multi-receiver anonymous signcryption scheme
Published 2016-06-01Subjects: “…certificateless cryptography…”
Get full text
Article -
193
A Novel Approach for Safeguarding Kurdish Text Files via Modified AES-OTP and Enhanced RSA Cryptosystem on Unreliable Networks
Published 2024-06-01Subjects: “…cryptography…”
Get full text
Article -
194
Legal Status of Voters and Observers in the Remote Electronic Voting System in Russia
Published 2024-04-01Subjects: Get full text
Article -
195
Secure two-party line segments intersection scheme and its application in privacy-preserving convex hull intersection
Published 2013-01-01Subjects: “…cryptography…”
Get full text
Article -
196
A Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services
Published 2024-12-01Subjects: “…functional biased elliptic curve cryptography algorithm (fb-ecc)…”
Get full text
Article -
197
Predictions for 2025: Artificial Intelligence in Modern Drug Development, Quantum Proof Encryption, and Health Data Monetization
Published 2024-12-01Subjects: Get full text
Article