-
161
Scheduling algorithm for stochastic job stream cipher service based on load balancing
Published 2018-06-01Subjects: Get full text
Article -
162
Conditions for anonymity in some generic public-key encryption constructions
Published 2009-01-01Subjects: “…computational cryptography…”
Get full text
Article -
163
Research on the programming language for proxy re-encryption
Published 2018-06-01Subjects: Get full text
Article -
164
Anonymous authentication scheme based on one-off public key in pervasive computing environments
Published 2012-02-01Subjects: Get full text
Article -
165
Authenticated encryption mode with blocks skipping
Published 2021-10-01Subjects: “…cryptography…”
Get full text
Article -
166
Research and simulation of timing attacks on ECC
Published 2016-04-01Subjects: Get full text
Article -
167
Accelerating the SM3 hash algorithm with CPU‐FPGA Co‐Designed architecture
Published 2021-11-01Subjects: Get full text
Article -
168
Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud
Published 2021-07-01Subjects: “…identity-based public-key cryptography…”
Get full text
Article -
169
Certificateless strong designated verifier multi-signature
Published 2016-06-01Subjects: “…certificateless public key cryptography…”
Get full text
Article -
170
Review of cryptographic application security evaluation techniques for new critical infrastructures
Published 2023-12-01Subjects: Get full text
Article -
171
Identity-based ring signature scheme under standard model
Published 2008-01-01Subjects: Get full text
Article -
172
DWB-AES: an implementation of dynamic white-box based on AES
Published 2021-02-01Subjects: Get full text
Article -
173
ID-based on-line/off-line threshold signature scheme without bilinear pairing
Published 2013-08-01Subjects: Get full text
Article -
174
Efficient pairing-free CP-ABE based on ordered binary decision diagram
Published 2019-12-01Subjects: Get full text
Article -
175
Quantum Safe Multi-Factor User Authentication Protocol for Cloud-Assisted Medical IoT
Published 2025-01-01Subjects: Get full text
Article -
176
Compact software/hardware co-design and implementation method of Aigis-sig digital signature scheme
Published 2021-04-01Subjects: “…post-quantum cryptography…”
Get full text
Article -
177
5-pass zero-knowledge identity authentication scheme based on matrix completion problem
Published 2021-11-01Subjects: “…post-quantum cryptography…”
Get full text
Article -
178
An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)
Published 2024-12-01Subjects: Get full text
Article -
179
Threshold ring signature for wireless sensor networks
Published 2012-03-01Subjects: Get full text
Article -
180
RLWE-based key-policy ABE scheme
Published 2016-10-01Subjects: “…lattice cryptography…”
Get full text
Article