-
21
Research and design of parallel architecture processor for elliptic curve cryptography
Published 2011-01-01Subjects: “…elliptic curve cryptography…”
Get full text
Article -
22
Recent progress in the security evaluation of multivariate public‐key cryptography
Published 2023-03-01“…Abstract Multivariate public‐key cryptography (MPKC) is considered a leading candidate for post‐quantum cryptography (PQC). …”
Get full text
Article -
23
Stochastic job stream scheduling method for cipher chip with multi-cryptography
Published 2016-12-01Subjects: Get full text
Article -
24
An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms
Published 2022-04-01“…This article proposes an efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms, which includes an encryption and a decryption schemes for gray-scale and color secret images. …”
Get full text
Article -
25
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
Published 2023-03-01Get full text
Article -
26
Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services
Published 2024-01-01Get full text
Article -
27
A compressive data gathering method based on El Gamal cryptography
Published 2019-12-01Subjects: Get full text
Article -
28
Configurable radix-4 NTT hardware optimization and implementation for lattice-based cryptography
Published 2024-10-01Subjects: Get full text
Article -
29
A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Cryptography
Published 2025-01-01Subjects: Get full text
Article -
30
Summary and study on the curriculum reform of modern cryptography based on SPOC and flip classroom
Published 2019-06-01Subjects: “…modern cryptography…”
Get full text
Article -
31
Breaking barriers in two-party quantum cryptography via stochastic semidefinite programming
Published 2025-01-01Get full text
Article -
32
Elliptic-Curve Cryptography Implementation on RISC-V Processors for Internet of Things Applications
Published 2024-01-01“…Elliptic-curve cryptography (ECC) is a popular technique of public-key cryptography used for secure communications in Internet of Things (IoT) applications. …”
Get full text
Article -
33
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
Published 2016-05-01Subjects: Get full text
Article -
34
Research of the small Qubit quantum computing attack to the RSA public key cryptography
Published 2017-10-01“…The small Qubit quantum algorithm attack to RSA was proposed,the need Qubit of the first quantum register from 2L to L1,it can be reduced to 2 Qubit,the overall space complexity denoted (L1,L),where 2L1≥r,r is the period of decomposed.Because of the reduce of the first quantum register,it reduces the algorithm’s complexity and success rates,and use the binary look-up table method to compute the modular exponentiation,it enhances the computing speed.The improved algorithm’s quantum circuit complexity is T=O(2L2).It have a significant improvement on the time complexity and space complexity.Although the success rate is reduced,the overall success solution time is still lower than the Shor algorithm and the current major improvements Shor algorithm.Completed a simulation experiment.Respectively use the 11、10、9 Qubit decomposing the quantum circuit 119.The new algorithm explore the reality of using a universal quantum computer device to decipher the public key cryptography.…”
Get full text
Article -
35
Perspectives on Entangled Nuclear Particle Pairs Generation and Manipulation in Quantum Communication and Cryptography Systems
Published 2012-01-01“…Entanglement between two quantum elements is a phenomenon which presents a broad application spectrum, being used largely in quantum cryptography schemes and in physical characterisation of the universe. …”
Get full text
Article -
36
Certificateless public key cryptography based provable data possession scheme in edge environment
Published 2022-07-01Subjects: “…certificateless public key cryptography…”
Get full text
Article -
37
Comment on ‘Targeted Ciphers for Format‐Preserving Encryption’ from Selected Areas in Cryptography 2018
Published 2021-09-01Subjects: “…cryptography…”
Get full text
Article -
38
Intelligent CO2 Monitoring for Diagnosis of Sleep Apnea Using Neural Cryptography Techniques
Published 2022-01-01Get full text
Article -
39
Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT
Published 2016-06-01Subjects: Get full text
Article -
40
A Blockchain Network Admission Control Mechanism Using Anonymous Identity-Based Cryptography
Published 2024-12-01Subjects: Get full text
Article