-
201
Si Substrate Backside—An Emerging Physical Attack Surface for Secure ICs in Flip Chip Packaging
Published 2024-01-01Subjects: Get full text
Article -
202
Intrusion detection system for V2X communication in VANET networks using machine learning-based cryptographic protocols
Published 2024-12-01Subjects: Get full text
Article -
203
qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era
Published 2025-01-01Subjects: Get full text
Article -
204
-
205
Design of a Multi-Layer Symmetric Encryption System Using Reversible Cellular Automata
Published 2025-01-01Subjects: Get full text
Article -
206
An improved sunflower optimization algorithm for cluster selection with secured data transmission using cryptographic techniques in WSNS-IoT
Published 2024-01-01Subjects: Get full text
Article -
207
Beyond full‐bit secure authenticated encryption without input‐length limitation
Published 2022-07-01Subjects: Get full text
Article -
208
Unique Information Through the Lens of Channel Ordering: An Introduction and Review
Published 2025-01-01Subjects: “…information-theoretic cryptography…”
Get full text
Article -
209
2D physically unclonable functions of the arbiter type
Published 2023-03-01Subjects: “…physical cryptography…”
Get full text
Article -
210
Privacy-preserving security of IoT networks: A comparative analysis of methods and applications
Published 2025-12-01Subjects: Get full text
Article -
211
ID-based efficient and proactive threshold proxy signature in the standard model
Published 2011-01-01Subjects: Get full text
Article -
212
A novel method for developing post-quantum cryptoschemes and a practical signature algorithm
Published 2025-01-01Subjects: Get full text
Article -
213
Host’s source address verification based on stream authentication in the IPv6 access subnet
Published 2013-01-01Subjects: Get full text
Article -
214
Efficient traceable identity-based signature scheme
Published 2009-01-01Subjects: “…identity-based cryptography…”
Get full text
Article -
215
Security analysis of public-key cryptosystems based on matrix action problem against quantum attack
Published 2023-03-01Subjects: Get full text
Article -
216
Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption
Published 2025-01-01Subjects: “…quantum cryptography…”
Get full text
Article -
217
Coexistence Demonstration and Wavelength Dependency Analysis of S-Band CV-QKD Signal with Fully Loaded C+L-Band DWDM Signals
Published 2025-01-01Subjects: “…quantum cryptography…”
Get full text
Article -
218
Post-quantum encryption technology based on BRLWE for internet of things
Published 2022-10-01Subjects: “…post-quantum cryptography…”
Get full text
Article -
219
Quantum Private Comparison Protocol with Cluster States
Published 2025-01-01Subjects: Get full text
Article -
220
Fault analysis on elliptic curve cryptosystems with sliding window method
Published 2012-01-01Subjects: “…public key cryptography…”
Get full text
Article