-
121
Key establish scheme for optical encryption system based on IBE
Published 2012-04-01Subjects: “…identity-based cryptography…”
Get full text
Article -
122
Scheduling algorithm for stochastic job stream cipher service based on load balancing
Published 2018-06-01Subjects: Get full text
Article -
123
Conditions for anonymity in some generic public-key encryption constructions
Published 2009-01-01Subjects: “…computational cryptography…”
Get full text
Article -
124
Research on the programming language for proxy re-encryption
Published 2018-06-01Subjects: Get full text
Article -
125
Anonymous authentication scheme based on one-off public key in pervasive computing environments
Published 2012-02-01Subjects: Get full text
Article -
126
Authenticated encryption mode with blocks skipping
Published 2021-10-01Subjects: “…cryptography…”
Get full text
Article -
127
Research and simulation of timing attacks on ECC
Published 2016-04-01Subjects: Get full text
Article -
128
Accelerating the SM3 hash algorithm with CPU‐FPGA Co‐Designed architecture
Published 2021-11-01Subjects: Get full text
Article -
129
Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud
Published 2021-07-01Subjects: “…identity-based public-key cryptography…”
Get full text
Article -
130
Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT
Published 2016-06-01Subjects: Get full text
Article -
131
A Blockchain Network Admission Control Mechanism Using Anonymous Identity-Based Cryptography
Published 2024-12-01Subjects: Get full text
Article -
132
Certificateless strong designated verifier multi-signature
Published 2016-06-01Subjects: “…certificateless public key cryptography…”
Get full text
Article -
133
Review of cryptographic application security evaluation techniques for new critical infrastructures
Published 2023-12-01Subjects: Get full text
Article -
134
Identity-based ring signature scheme under standard model
Published 2008-01-01Subjects: Get full text
Article -
135
DWB-AES: an implementation of dynamic white-box based on AES
Published 2021-02-01Subjects: Get full text
Article -
136
ID-based on-line/off-line threshold signature scheme without bilinear pairing
Published 2013-08-01Subjects: Get full text
Article -
137
Efficient pairing-free CP-ABE based on ordered binary decision diagram
Published 2019-12-01Subjects: Get full text
Article -
138
Quantum Safe Multi-Factor User Authentication Protocol for Cloud-Assisted Medical IoT
Published 2025-01-01Subjects: Get full text
Article -
139
Compact software/hardware co-design and implementation method of Aigis-sig digital signature scheme
Published 2021-04-01Subjects: “…post-quantum cryptography…”
Get full text
Article -
140
5-pass zero-knowledge identity authentication scheme based on matrix completion problem
Published 2021-11-01Subjects: “…post-quantum cryptography…”
Get full text
Article