-
21
Forward secure proxy signature scheme
Published 2005-01-01Subjects: “…cryptography…”
Get full text
Article -
22
Analysis of cyberspace security based on game theory
Published 2015-12-01Subjects: Get full text
Article -
23
Security on a cryptographic model based on chaos
Published 2008-01-01Subjects: Get full text
Article -
24
Exploiting statistical effective fault attack in a blind setting
Published 2023-07-01Subjects: “…cryptography…”
Get full text
Article -
25
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
Published 2021-09-01Subjects: Get full text
Article -
26
Indifferentiable hash functions in the standard model
Published 2021-07-01Subjects: “…cryptography…”
Get full text
Article -
27
Saturation cryptanalysis of CLEFIA
Published 2008-01-01Subjects: “…cryptography…”
Get full text
Article -
28
New indifferentiability security proof of MDPH hash function
Published 2022-07-01Subjects: “…cryptography…”
Get full text
Article -
29
Efficiency Simultaneous key Exchange-Cryptography Extraction from Public key in Fog-Cloud Federation-Based Secure Offloading for Automatic Weather Stations Observing Systems
Published 2023-03-01Subjects: “…cryptography…”
Get full text
Article -
30
Implementation of Simplified Data Encryption Standard on FPGA using VHDL
Published 2022-03-01Subjects: “…Cryptography, DES, S-DES, FPGA, VHDL…”
Get full text
Article -
31
Telecom-operators cryptography application system with quantum key distribution
Published 2023-01-01Subjects: Get full text
Article -
32
Cryptanalysis of an efficient group signature schemen
Published 2007-01-01Subjects: “…cryptography…”
Get full text
Article -
33
DIGITAL CURRENCY: A CONCEPTUAL FRAMEWORK OF PERFORMANCE
Published 2023-02-01Subjects: “…Cryptography, cryptocurrency, volume, market capitalization, price…”
Get full text
Article -
34
On a clock-controlled keystream generator and its cryptographic properties
Published 2007-01-01Subjects: “…cryptography…”
Get full text
Article -
35
IMPLEMENTATION OF MESSAGE EMBEDDING INTO VIDEO USING RSA AND LSB2BIT ALGORITHMS
Published 2024-12-01Subjects: Get full text
Article -
36
Perfect contrast visual cryptography scheme
Published 2009-01-01Subjects: “…visual cryptography…”
Get full text
Article -
37
Analysis of the amplitude form of the quantum hash function
Published 2023-11-01Subjects: “…quantum cryptography…”
Get full text
Article -
38
Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
Published 2022-01-01Subjects: Get full text
Article -
39
Research on affine equivalence enumeration of the three families vectorial function
Published 2017-11-01Subjects: “…cryptography…”
Get full text
Article -
40
Encryption based on reversible cellular automata
Published 2008-01-01Subjects: “…cryptography…”
Get full text
Article