-
61
Revisit two memoryless state‐recovery cryptanalysis methods on A5/1
Published 2023-07-01Subjects: “…cryptography…”
Get full text
Article -
62
New attacks against reduced Rijndael‐160
Published 2022-01-01Subjects: “…cryptography…”
Get full text
Article -
63
Yoyo trick on type‐II generalised Feistel networks
Published 2021-11-01Subjects: “…cryptography…”
Get full text
Article -
64
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Published 2021-01-01Subjects: “…cryptography…”
Get full text
Article -
65
-
66
ABE-IBS based signature-encryption method for WSN
Published 2010-01-01Subjects: “…attribute-based cryptography…”
Get full text
Article -
67
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system
Published 2021-01-01Subjects: “…cryptography…”
Get full text
Article -
68
-
69
User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment
Published 2025-01-01Subjects: “…cryptography…”
Get full text
Article -
70
Efficiency Simultaneous key Exchange-Cryptography Extraction from Public key in Fog-Cloud Federation-Based Secure Offloading for Automatic Weather Stations Observing Systems
Published 2023-03-01Subjects: “…cryptography…”
Get full text
Article -
71
On-demand key management based on social attribute for opportunistic networks
Published 2012-12-01Subjects: Get full text
Article -
72
Forward secure proxy signature scheme
Published 2005-01-01Subjects: “…cryptography…”
Get full text
Article -
73
Analysis of cyberspace security based on game theory
Published 2015-12-01Subjects: Get full text
Article -
74
Security on a cryptographic model based on chaos
Published 2008-01-01Subjects: Get full text
Article -
75
Exploiting statistical effective fault attack in a blind setting
Published 2023-07-01Subjects: “…cryptography…”
Get full text
Article -
76
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
Published 2021-09-01Subjects: Get full text
Article -
77
Indifferentiable hash functions in the standard model
Published 2021-07-01Subjects: “…cryptography…”
Get full text
Article -
78
Saturation cryptanalysis of CLEFIA
Published 2008-01-01Subjects: “…cryptography…”
Get full text
Article -
79
New indifferentiability security proof of MDPH hash function
Published 2022-07-01Subjects: “…cryptography…”
Get full text
Article -
80
Implementation of Simplified Data Encryption Standard on FPGA using VHDL
Published 2022-03-01Subjects: “…Cryptography, DES, S-DES, FPGA, VHDL…”
Get full text
Article