Showing 81 - 100 results of 176 for search '"Cryptography"', query time: 0.04s Refine Results
  1. 81
  2. 82

    Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption by Min Hou, Yue Wu

    Published 2025-01-01
    Subjects: “…quantum cryptography…”
    Get full text
    Article
  3. 83
  4. 84
  5. 85
  6. 86

    On the Security of Certificateless Signature Schemes by Gaurav Sharma, Suman Bala, Anil K. Verma

    Published 2013-06-01
    “…Certificateless public key cryptography (CL-PKC) deals effectively with the twin issues of certificate management in traditional public key cryptography and key escrow problem in identity-based cryptography. …”
    Get full text
    Article
  7. 87

    RETRACTED: Parallel Encryption With Digit Arithmetic Of Covertext Model Using Duplicated Covertext by Hari Murti, Edy Supriyanto, Rara Redjeki, Eka Ardhianto

    Published 2022-12-01
    “…Furthermore, public key cryptography is the type of cryptography that using two interrelated keys, namely the public and private keys. …”
    Get full text
    Article
  8. 88
  9. 89
  10. 90

    Implementasi Teknik Enkripsi dan Dekripsi dI File Video Menggunakan Algoritma Blowfish by Nuniek Fahriani, Harunur Rosyid

    Published 2019-12-01
    “…Dibangun berbasis desktop.   Abstract Cryptography (cryptography) is a data security process to keep messages (files) from being "disturbed" by third parties. …”
    Get full text
    Article
  11. 91
  12. 92
  13. 93

    Some Graph-Based Encryption Schemes by Baizhu Ni, Rabiha Qazi, Shafiq Ur Rehman, Ghulam Farid

    Published 2021-01-01
    “…In today’s technological world, confidentiality is an important issue to deal with, and it is carried out through different proficiencies. Cryptography is a scientific technique of securing a communication from unauthenticated approach. …”
    Get full text
    Article
  14. 94

    Synthesis of symmetric paths of arbiter physically unclonable function on FPGA by A. A. Ivaniuk

    Published 2019-06-01
    “…Physical cryptography is one of the current trends among the existing methods of protecting digital devices from illegal access. …”
    Get full text
    Article
  15. 95
  16. 96

    Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks by Yang Lu, Jiguo Li

    Published 2014-01-01
    “…As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. …”
    Get full text
    Article
  17. 97

    Pairing Optimizations for Isogeny-Based Cryptosystems by Shiping Cai, Kaizhan Lin, Chang-An Zhao

    Published 2024-01-01
    “…In isogeny-based cryptography, bilinear pairings are regarded as a powerful tool in various applications, including key compression, public key validation, and torsion basis generation. …”
    Get full text
    Article
  18. 98

    Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB by Agus Rakhmadi Mido, Erik Iman Heri Ujianto

    Published 2022-02-01
    “…Cryptography and steganography have similarities in terms of security. …”
    Get full text
    Article
  19. 99

    Optimized SM4 Hardware Implementations for Low Area Consumption by Ruolin Zhang, Zejun Xiang, Shasha Zhang, Xiangyong Zeng, Min Song

    Published 2024-01-01
    “…Our designs make SM4 competitive with many ciphers specifically designed for lightweight cryptography.…”
    Get full text
    Article
  20. 100

    Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks by Walter Tiberti, Federica Caruso, Luigi Pomante, Marco Pugliese, Marco Santic, Fortunato Santucci

    Published 2020-10-01
    “…In particular, moving from some results previously achieved in our research activity, this article extends a cryptography scheme in order to better comply with the security requirements that arise from real-world wireless sensor network installations. …”
    Get full text
    Article