-
41
Construction and Research of Lightweight Cryptography SOPT-S Boxes Based on Inverse Mapping in Galois Field
Published 2014-04-01Subjects: “…lightweight cryptography…”
Get full text
Article -
42
Enhancing the Process of AES: A Lightweight Cryptography Algorithm AES for Ad-hoc Environments
Published 2022-12-01Subjects: Get full text
Article -
43
A high speed processor for elliptic curve cryptography over NIST prime field
Published 2022-07-01Subjects: “…cryptography…”
Get full text
Article -
44
A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security
Published 2023-01-01“…Based on different security mechanisms, we first categorize the existing works of secure communications in satellite internet into two categories: cryptography-based and physical layer security-based. …”
Get full text
Article -
45
-
46
FPGA multi-unit parallel optimization and implementation of post-quantum cryptography CRYSTALS-Kyber
Published 2022-02-01Subjects: “…post-quantum cryptography…”
Get full text
Article -
47
Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
Published 2016-05-01Subjects: Get full text
Article -
48
-
49
APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks
Published 2013-06-01“…In this paper, we make the first attempt to solve those two security risks together without relying cryptography. We propose a scheme, namely, APP (authenticate ONS and protect EPC privacy), to guarantee the authenticity of IP addresses for PML servers as well as EPC privacy and to maintain ultralightweight computation cost. …”
Get full text
Article -
50
A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things
Published 2022-11-01“…In this article, we present a flexible continuous-wave quantum cryptography scheme for Internet of Things systems. In this configuration, the IoT controller contains a narrow linewidth laser as a real local oscillator. …”
Get full text
Article -
51
Revocable identity‐based matchmaking encryption in the standard model
Published 2023-07-01Subjects: “…cryptography…”
Get full text
Article -
52
Research on algorithm for raster map multi-level sharing based on region incrementing color visual cryptography
Published 2019-09-01Subjects: “…region incrementing visual cryptography…”
Get full text
Article -
53
Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures
Published 2021-07-01Subjects: “…cryptography…”
Get full text
Article -
54
-
55
Encrypt, sign, attack : a compact introduction to cryptography /
Published 2022Subjects: View in OPAC
Book -
56
A Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services
Published 2024-12-01Subjects: “…functional biased elliptic curve cryptography algorithm (fb-ecc)…”
Get full text
Article -
57
Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives
Published 2024-06-01Subjects: Get full text
Article -
58
Efficient constructions for large‐state block ciphers based on AES New Instructions
Published 2022-05-01Subjects: “…AES‐NI, block cipher, cryptography, private key cryptography…”
Get full text
Article -
59
Survey of code-based digital signatures
Published 2021-08-01Subjects: “…quantum-resistant cryptography…”
Get full text
Article -
60
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
Published 2021-01-01Subjects: “…public key cryptography…”
Get full text
Article