-
41
Efficient multiplication for finite fields of p characteristic
Published 2009-01-01Subjects: “…cryptography…”
Get full text
Article -
42
Generalization and improvement of Nyberg-Rueppel message recovery blind signatures
Published 2005-01-01Subjects: “…cryptography…”
Get full text
Article -
43
In-depth study of lightweight block ciphers: Performance assessment and implementation on sensor motes
Published 2025-02-01Subjects: Get full text
Article -
44
Secure communication mechanism for VSN based on certificateless signcryption
Published 2021-07-01Subjects: Get full text
Article -
45
Homomorphic Signature With Designated Evaluator
Published 2025-01-01Subjects: “…Cryptography…”
Get full text
Article -
46
Survey on privacy preserving techniques for blockchain
Published 2018-09-01Subjects: Get full text
Article -
47
MARPUF: physical unclonable function with improved machine learning attack resistance
Published 2021-08-01Subjects: “…cryptography…”
Get full text
Article -
48
Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants
Published 2021-11-01Subjects: Get full text
Article -
49
Medical Image Encryption and Decryption Based on DNA: A Survey
Published 2023-09-01Subjects: “…DNA Cryptography…”
Get full text
Article -
50
Research on distributed identity authentication mechanism of IoT device based on blockchain
Published 2020-06-01Subjects: Get full text
Article -
51
Computing on the joint quadratic complexity of multiple periodic sequences
Published 2012-06-01Subjects: “…cryptography…”
Get full text
Article -
52
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01Subjects: Get full text
Article -
53
ID-based threshold decryption with non-reconstruction of the private key
Published 2009-01-01Subjects: “…ID-based cryptography…”
Get full text
Article -
54
IoT enabled data protection with substitution box for lightweight ciphers
Published 2025-03-01Subjects: Get full text
Article -
55
Privacy-preserving image processing in cloud computing
Published 2016-01-01Subjects: Get full text
Article -
56
Quantum secure communication network architecture and mobile application solution
Published 2018-09-01Subjects: Get full text
Article -
57
Review of algebraic attacks on stream ciphers
Published 2006-01-01Subjects: “…cryptography…”
Get full text
Article -
58
Exponential information’s extraction from power traces of modulo exponentiation implemented on FPGA
Published 2010-01-01Subjects: “…cryptography…”
Get full text
Article -
59
Investigation of an attack on the multi-prime RSA cryptosystem based on cubic equations
Published 2023-11-01Subjects: “…asymmetric cryptography…”
Get full text
Article -
60
ECC-Based Authentication Protocol for Military Internet of Drone (IoD): A Holistic Security Framework
Published 2025-01-01Subjects: Get full text
Article