-
61
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search
Published 2023-05-01Subjects: Get full text
Article -
62
The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field
Published 2022-01-01Subjects: “…Elliptic curve cryptography…”
Get full text
Article -
63
Authenticated encryption mode with blocks skipping
Published 2021-10-01Subjects: “…cryptography…”
Get full text
Article -
64
Accelerating the SM3 hash algorithm with CPU‐FPGA Co‐Designed architecture
Published 2021-11-01Subjects: Get full text
Article -
65
An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)
Published 2024-12-01Subjects: Get full text
Article -
66
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Published 2025-01-01Subjects: Get full text
Article -
67
Unimodal‐Bio‐GAN: Keyless biometric salting scheme based on generative adversarial network
Published 2021-11-01Subjects: Get full text
Article -
68
-
69
Intelligent physiological signal infosecurity: Case study in photoplethysmography (PPG) signal
Published 2022-05-01Subjects: Get full text
Article -
70
A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review
Published 2024-01-01Subjects: “…Cryptography…”
Get full text
Article -
71
Improved lattice‐based mix‐nets for electronic voting
Published 2023-01-01Subjects: “…lattice‐based post‐quantum cryptography…”
Get full text
Article -
72
Strengthened 32‐bit AES implementation: Architectural error correction configuration with a new voting scheme
Published 2021-11-01Subjects: “…cryptography…”
Get full text
Article -
73
A Secure and Efficient White-Box Implementation of SM4
Published 2024-12-01Subjects: Get full text
Article -
74
Si Substrate Backside—An Emerging Physical Attack Surface for Secure ICs in Flip Chip Packaging
Published 2024-01-01Subjects: Get full text
Article -
75
qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era
Published 2025-01-01Subjects: Get full text
Article -
76
Design of a Multi-Layer Symmetric Encryption System Using Reversible Cellular Automata
Published 2025-01-01Subjects: Get full text
Article -
77
An improved sunflower optimization algorithm for cluster selection with secured data transmission using cryptographic techniques in WSNS-IoT
Published 2024-01-01Subjects: Get full text
Article -
78
Beyond full‐bit secure authenticated encryption without input‐length limitation
Published 2022-07-01Subjects: Get full text
Article -
79
Unique Information Through the Lens of Channel Ordering: An Introduction and Review
Published 2025-01-01Subjects: “…information-theoretic cryptography…”
Get full text
Article -
80
2D physically unclonable functions of the arbiter type
Published 2023-03-01Subjects: “…physical cryptography…”
Get full text
Article