-
101
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01Subjects: Get full text
Article -
102
ID-based threshold decryption with non-reconstruction of the private key
Published 2009-01-01Subjects: “…ID-based cryptography…”
Get full text
Article -
103
IoT enabled data protection with substitution box for lightweight ciphers
Published 2025-03-01Subjects: Get full text
Article -
104
Privacy-preserving image processing in cloud computing
Published 2016-01-01Subjects: Get full text
Article -
105
Quantum secure communication network architecture and mobile application solution
Published 2018-09-01Subjects: Get full text
Article -
106
Review of algebraic attacks on stream ciphers
Published 2006-01-01Subjects: “…cryptography…”
Get full text
Article -
107
Exponential information’s extraction from power traces of modulo exponentiation implemented on FPGA
Published 2010-01-01Subjects: “…cryptography…”
Get full text
Article -
108
Investigation of an attack on the multi-prime RSA cryptosystem based on cubic equations
Published 2023-11-01Subjects: “…asymmetric cryptography…”
Get full text
Article -
109
ECC-Based Authentication Protocol for Military Internet of Drone (IoD): A Holistic Security Framework
Published 2025-01-01Subjects: Get full text
Article -
110
ID-based wireless authentication scheme with anonymity
Published 2009-01-01Subjects: “…cryptography…”
Get full text
Article -
111
Identity-based cloud storage integrity checking from lattices
Published 2019-04-01Subjects: Get full text
Article -
112
FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review
Published 2021-03-01Subjects: “…Cryptography, DES algorithm, AES algorithm FPGAs Implementations, VHDL.…”
Get full text
Article -
113
-
114
About permutations on the sets of tuples from elements of the finite field
Published 2019-06-01Subjects: “…cryptography…”
Get full text
Article -
115
Identity-based cross-domain authentication scheme in pervasive computing environments
Published 2011-01-01Subjects: Get full text
Article -
116
Identity-based group key management scheme for space networks
Published 2010-01-01Subjects: Get full text
Article -
117
GAN-based pseudo random number generation optimized through genetic algorithms
Published 2024-11-01Subjects: Get full text
Article -
118
Provably secure certificate less blind proxy re-signatures
Published 2012-09-01Subjects: “…certificateless cryptography…”
Get full text
Article -
119
Design and implementation of secure Windows platform based on TCM
Published 2015-08-01Subjects: Get full text
Article -
120
Quantum Key Distribution Applicability to Smart Grid Cybersecurity Systems
Published 2025-01-01Subjects: “…symmetric and asymmetric cryptography…”
Get full text
Article