-
21
APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks
Published 2013-06-01“…In this paper, we make the first attempt to solve those two security risks together without relying cryptography. We propose a scheme, namely, APP (authenticate ONS and protect EPC privacy), to guarantee the authenticity of IP addresses for PML servers as well as EPC privacy and to maintain ultralightweight computation cost. …”
Get full text
Article -
22
A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things
Published 2022-11-01“…In this article, we present a flexible continuous-wave quantum cryptography scheme for Internet of Things systems. In this configuration, the IoT controller contains a narrow linewidth laser as a real local oscillator. …”
Get full text
Article -
23
Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures
Published 2021-07-01Subjects: “…cryptography…”
Get full text
Article -
24
Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives
Published 2024-06-01Subjects: Get full text
Article -
25
Efficient constructions for large‐state block ciphers based on AES New Instructions
Published 2022-05-01Subjects: “…AES‐NI, block cipher, cryptography, private key cryptography…”
Get full text
Article -
26
-
27
Encrypt, sign, attack : a compact introduction to cryptography /
Published 2022Subjects: View in OPAC
Book -
28
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
Published 2021-01-01Subjects: “…public key cryptography…”
Get full text
Article -
29
Revisit two memoryless state‐recovery cryptanalysis methods on A5/1
Published 2023-07-01Subjects: “…cryptography…”
Get full text
Article -
30
New attacks against reduced Rijndael‐160
Published 2022-01-01Subjects: “…cryptography…”
Get full text
Article -
31
Yoyo trick on type‐II generalised Feistel networks
Published 2021-11-01Subjects: “…cryptography…”
Get full text
Article -
32
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Published 2021-01-01Subjects: “…cryptography…”
Get full text
Article -
33
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system
Published 2021-01-01Subjects: “…cryptography…”
Get full text
Article -
34
-
35
-
36
Exploiting statistical effective fault attack in a blind setting
Published 2023-07-01Subjects: “…cryptography…”
Get full text
Article -
37
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
Published 2021-09-01Subjects: Get full text
Article -
38
Indifferentiable hash functions in the standard model
Published 2021-07-01Subjects: “…cryptography…”
Get full text
Article -
39
New indifferentiability security proof of MDPH hash function
Published 2022-07-01Subjects: “…cryptography…”
Get full text
Article -
40
Implementation of Simplified Data Encryption Standard on FPGA using VHDL
Published 2022-03-01Subjects: “…Cryptography, DES, S-DES, FPGA, VHDL…”
Get full text
Article