-
141
Note on the channel capacity of narrowband subliminal channels in one-way function
Published 2009-01-01Subjects: “…cryptography…”
Get full text
Article -
142
Saber With Hybrid Striding Toom Cook-Based Multiplier: Implementation Using Open-Source Tool Flow and Industry Standard Chip Design Tools
Published 2025-01-01Subjects: Get full text
Article -
143
Novel identity-based fully homomorphic encryption scheme from lattice
Published 2017-05-01Subjects: Get full text
Article -
144
CDBS: blind signature scheme based on CRYSTALS-Dilithium algorithm
Published 2024-07-01Subjects: Get full text
Article -
145
RSA-based image recognizable adversarial attack method
Published 2021-10-01Subjects: Get full text
Article -
146
Quantum public-key encryption protocol based on single-photon
Published 2014-11-01Subjects: Get full text
Article -
147
Survey of digital signature technology based on error correcting codes
Published 2016-11-01Subjects: Get full text
Article -
148
Study of secret sharing schemes based on quantum theory
Published 2009-01-01Subjects: Get full text
Article -
149
Secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key
Published 2018-05-01Subjects: Get full text
Article -
150
Efficiency identity-based threshold group signature scheme
Published 2009-01-01Subjects: Get full text
Article -
151
Constructions of rotation symmetric 2-resilient functions with 4t<sub>-</sub>1 number of variables
Published 2020-11-01Subjects: “…cryptography…”
Get full text
Article -
152
Certificateless generalized signcryption scheme in the standard model
Published 2017-04-01Subjects: “…certificateless cryptography…”
Get full text
Article -
153
Primitive polynomials and word oriented linear feedback shift registers
Published 2009-01-01Subjects: “…cryptography…”
Get full text
Article -
154
-
155
Construction and count of multi-output rotation symmetric resilient functions with 8 input variables
Published 2017-07-01Subjects: “…cryptography…”
Get full text
Article -
156
New bound of algebraic immunity of a class of Boolean function
Published 2016-10-01Subjects: “…cryptography…”
Get full text
Article -
157
The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field
Published 2022-01-01Subjects: “…Elliptic curve cryptography…”
Get full text
Article -
158
Rational-security and fair two-party comparison protocol
Published 2023-12-01Subjects: Get full text
Article -
159
Efficient and provably-secure certificateless sequential aggregate signature scheme
Published 2022-05-01Subjects: “…certificateless public key cryptography…”
Get full text
Article -
160
Key establish scheme for optical encryption system based on IBE
Published 2012-04-01Subjects: “…identity-based cryptography…”
Get full text
Article