-
1
-
2
A Review of DNA Cryptography
Published 2025-01-01“…We then comprehensively review 2 types of DNA cryptography: pseudo-DNA cryptography and natural DNA cryptography. …”
Get full text
Article -
3
Survey of braid-based cryptography
Published 2009-01-01“…The achievements of braid-based cryptography were surveyed: some recently developed cryptographic schemes were introduced, including key exchange protocols enciphering-deciphering and authentication schemes. …”
Get full text
Article -
4
Lossless sharing visual cryptography
Published 2013-03-01Subjects: “…isual cryptography…”
Get full text
Article -
5
Perfect contrast visual cryptography scheme
Published 2009-01-01Subjects: “…visual cryptography…”
Get full text
Article -
6
-
7
Cryptography algorithm for wireless channel of CBTC system
Published 2011-01-01“…As to the disadvantages of RC4 which was used for CBTC system,a new cryptography algorithm based on Montgomery-form ECC was brought forward.Compared with the traditional Montgomery elliptic curve,the improved algorithm would resume the value of y-coordinate with more security.In addition,compared with the traditional ECC,it has faster computing speed and can effectively resist the timing attack and energy attack.The new Montgomery-form ECC algorithm has accelerated current ECC encoding speed and would make great improvement to the implementation of ECC in CBTC and other wireless communication.…”
Get full text
Article -
8
Multistage Encryption for Text Using Steganography and Cryptography
Published 2023-03-01“…Finally, our research provides more security because of the mixture between cryptography and steganography. …”
Get full text
Article -
9
Progress and Security Analysis of Quantum Cryptography Communication
Published 2015-06-01Subjects: “…quantum cryptography communication…”
Get full text
Article -
10
Survey on blockchain privacy protection techniques in cryptography
Published 2022-08-01Subjects: Get full text
Article -
11
Hybrid Cryptography Based on Planets: Phobos & Deimos
Published 2025-01-01“…To address these issues, it is crucial to innovate in cryptography, the backbone of data security. This document presents the Phobos and Deimos encryption method, inspired by Mars’ moons. …”
Get full text
Article -
12
Application of Classical and Genomic Cryptography on Textual Dataset
Published 2024-12-01Get full text
Article -
13
A Survey of Post-Quantum Cryptography Migration in Vehicles
Published 2025-01-01Subjects: “…Post-quantum cryptography (PQC)…”
Get full text
Article -
14
Electronic Voting Protocol Using Identity-Based Cryptography
Published 2015-01-01“…Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. …”
Get full text
Article -
15
Telecom-operators cryptography application system with quantum key distribution
Published 2023-01-01Subjects: Get full text
Article -
16
Evaluation of blended instruction based on network platform in cryptography teaching
Published 2019-06-01Subjects: Get full text
Article -
17
A Privacy-Preserving Biometric Recognition System with Visual Cryptography
Published 2022-01-01“…Visual cryptography combines perfect ciphers and secret sharing in cryptography with images, thus eliminating the complex operations in existing privacy-preserving schemes based on cryptography or watermarking. …”
Get full text
Article -
18
A Survey of Efficient Lightweight Cryptography for Power-Constrained Microcontrollers
Published 2024-12-01“…This review paper assesses the implementation of lightweight cryptographic algorithms for power-constrained microcontrollers in IoT systems using symmetric cryptography. The implemented algorithms analyze the resource constraints of the IoT devices and compare their performance for the efficient implementation of secure monitoring systems. …”
Get full text
Article -
19
Fare non-repudiation protocol based on identity-based cryptography
Published 2009-01-01Subjects: “…identity-based cryptography…”
Get full text
Article -
20
Research progress on cloud data assured deletion based on cryptography
Published 2016-08-01Get full text
Article