-
141
An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)
Published 2024-12-01Subjects: Get full text
Article -
142
Threshold ring signature for wireless sensor networks
Published 2012-03-01Subjects: Get full text
Article -
143
RLWE-based key-policy ABE scheme
Published 2016-10-01Subjects: “…lattice cryptography…”
Get full text
Article -
144
FPGA multi-unit parallel optimization and implementation of post-quantum cryptography CRYSTALS-Kyber
Published 2022-02-01Subjects: “…post-quantum cryptography…”
Get full text
Article -
145
-
146
Linear transformation shift register sequences
Published 2016-05-01Subjects: “…cryptography…”
Get full text
Article -
147
Certificateless public key cryptography based provable data possession scheme in edge environment
Published 2022-07-01Subjects: “…certificateless public key cryptography…”
Get full text
Article -
148
Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
Published 2016-05-01Subjects: Get full text
Article -
149
Construction contemplation of cloud platform for domestic password service based on quantum secret communication
Published 2018-07-01Subjects: Get full text
Article -
150
Identity-based incremental signature scheme from lattices
Published 2021-01-01Subjects: Get full text
Article -
151
Simple Matrix encryption scheme with variable ciphertext length
Published 2018-04-01Subjects: “…multivariable public key cryptography…”
Get full text
Article -
152
Stochastic job stream scheduling method for cipher chip with multi-cryptography
Published 2016-12-01Subjects: Get full text
Article -
153
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Published 2025-01-01Subjects: Get full text
Article -
154
Pairing-free certificateless blockchain-based access authentication method for spatial information network
Published 2024-08-01Subjects: “…certificateless public key cryptography distribution technology…”
Get full text
Article -
155
Improved certificateless sequential multi-signature scheme
Published 2015-10-01Subjects: “…certificateless public key cryptography…”
Get full text
Article -
156
Unimodal‐Bio‐GAN: Keyless biometric salting scheme based on generative adversarial network
Published 2021-11-01Subjects: Get full text
Article -
157
Fair and rational delegation of computation in the universally composable framework
Published 2021-09-01Subjects: “…blockchain model of cryptography…”
Get full text
Article -
158
Concrete constructions of 2-resilient rotation symmetric Boolean functions with 7 variables
Published 2024-01-01Subjects: “…cryptography…”
Get full text
Article -
159
-
160
Extended algebraic immunity of symmetric Boolean function
Published 2014-11-01Subjects: “…cryptography…”
Get full text
Article