-
121
Ein neuer Fund um die Chymische Hochzeit aus der späteren Korrespondenz Johann Valentin Andreaes
Published 2018-07-01Subjects: Get full text
Article -
122
Breaking the HFEM public key scheme
Published 2013-03-01Subjects: “…post-quantum cryptography…”
Get full text
Article -
123
Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment
Published 2021-05-01Subjects: Get full text
Article -
124
An Integrated Image Encryption Scheme Based on Elliptic Curve
Published 2023-01-01Subjects: Get full text
Article -
125
A Low-Cost PKC-Based RFID Mutual Authentication Protocol
Published 2013-10-01Subjects: Get full text
Article -
126
Verifiable access control scheme based on unpaired CP-ABE in fog computing
Published 2021-08-01Subjects: Get full text
Article -
127
Performance evaluation of the SM4 cipher based on field‐programmable gate array implementation
Published 2021-03-01Subjects: “…cryptography…”
Get full text
Article -
128
Physical One‐Way Functions for Decentralized Consensus Via Proof of Physical Work
Published 2025-02-01Subjects: “…cryptography…”
Get full text
Article -
129
De la logique à l’algorithme : la traduction dans le design de programmes
Published 2022-07-01Subjects: Get full text
Article -
130
Generalized Centered Binomial Distribution for Bimodal Lattice Signatures
Published 2025-01-01Subjects: “…Post-quantum cryptography…”
Get full text
Article -
131
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search
Published 2023-05-01Subjects: Get full text
Article -
132
Hierarchical location-diversity-based low-delay anonymous communication framework
Published 2009-01-01Subjects: “…cryptography…”
Get full text
Article -
133
Multi-authority attribute-based identification scheme
Published 2021-03-01Subjects: Get full text
Article -
134
Security of the cryptosystems based on ergodic matrices
Published 2015-08-01Subjects: Get full text
Article -
135
Realization of smart home key management mechanism based on ECC
Published 2017-06-01Subjects: Get full text
Article -
136
Identification on the structures of block ciphers using machine learning
Published 2023-06-01Subjects: Get full text
Article -
137
Identity-based roaming protocol with anonymity for heterogeneous wireless networks
Published 2010-01-01Subjects: “…identity-based public key cryptography…”
Get full text
Article -
138
Privacy protection of warning message publishing protocol in VANET
Published 2021-08-01Subjects: Get full text
Article -
139
Secure Biometric Verification in the Presence of Malicious Adversaries
Published 2025-01-01Subjects: Get full text
Article -
140
Cross-domain authentication scheme based on consortium blockchain
Published 2022-06-01Subjects: Get full text
Article