-
81
A novel method for developing post-quantum cryptoschemes and a practical signature algorithm
Published 2025-01-01Subjects: Get full text
Article -
82
Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption
Published 2025-01-01Subjects: “…quantum cryptography…”
Get full text
Article -
83
Coexistence Demonstration and Wavelength Dependency Analysis of S-Band CV-QKD Signal with Fully Loaded C+L-Band DWDM Signals
Published 2025-01-01Subjects: “…quantum cryptography…”
Get full text
Article -
84
Quantum Private Comparison Protocol with Cluster States
Published 2025-01-01Subjects: Get full text
Article -
85
A Novel Approach for Safeguarding Kurdish Text Files via Modified AES-OTP and Enhanced RSA Cryptosystem on Unreliable Networks
Published 2024-06-01Subjects: “…cryptography…”
Get full text
Article -
86
On the Security of Certificateless Signature Schemes
Published 2013-06-01“…Certificateless public key cryptography (CL-PKC) deals effectively with the twin issues of certificate management in traditional public key cryptography and key escrow problem in identity-based cryptography. …”
Get full text
Article -
87
RETRACTED: Parallel Encryption With Digit Arithmetic Of Covertext Model Using Duplicated Covertext
Published 2022-12-01“…Furthermore, public key cryptography is the type of cryptography that using two interrelated keys, namely the public and private keys. …”
Get full text
Article -
88
Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism
Published 2014-01-01Get full text
Article -
89
Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service
Published 2019-04-01Get full text
Article -
90
Implementasi Teknik Enkripsi dan Dekripsi dI File Video Menggunakan Algoritma Blowfish
Published 2019-12-01“…Dibangun berbasis desktop. Abstract Cryptography (cryptography) is a data security process to keep messages (files) from being "disturbed" by third parties. …”
Get full text
Article -
91
SURVEY AND PROPOSED METHOD TO DETECT ADVERSARIAL EXAMPLES USING AN ADVERSARIAL RETRAINING MODEL
Published 2024-08-01Get full text
Article -
92
Image Encryption Using a Lightweight Stream Encryption Algorithm
Published 2012-01-01Get full text
Article -
93
Some Graph-Based Encryption Schemes
Published 2021-01-01“…In today’s technological world, confidentiality is an important issue to deal with, and it is carried out through different proficiencies. Cryptography is a scientific technique of securing a communication from unauthenticated approach. …”
Get full text
Article -
94
Synthesis of symmetric paths of arbiter physically unclonable function on FPGA
Published 2019-06-01“…Physical cryptography is one of the current trends among the existing methods of protecting digital devices from illegal access. …”
Get full text
Article -
95
Smart Home Security: An Efficient Multi-Factor Authentication Protocol
Published 2024-01-01Get full text
Article -
96
Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks
Published 2014-01-01“…As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. …”
Get full text
Article -
97
Pairing Optimizations for Isogeny-Based Cryptosystems
Published 2024-01-01“…In isogeny-based cryptography, bilinear pairings are regarded as a powerful tool in various applications, including key compression, public key validation, and torsion basis generation. …”
Get full text
Article -
98
Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB
Published 2022-02-01“…Cryptography and steganography have similarities in terms of security. …”
Get full text
Article -
99
Optimized SM4 Hardware Implementations for Low Area Consumption
Published 2024-01-01“…Our designs make SM4 competitive with many ciphers specifically designed for lightweight cryptography.…”
Get full text
Article -
100
Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks
Published 2020-10-01“…In particular, moving from some results previously achieved in our research activity, this article extends a cryptography scheme in order to better comply with the security requirements that arise from real-world wireless sensor network installations. …”
Get full text
Article