-
1
Revocable identity‐based matchmaking encryption in the standard model
Published 2023-07-01Subjects: “…cryptography…”
Get full text
Article -
2
Comment on ‘Targeted Ciphers for Format‐Preserving Encryption’ from Selected Areas in Cryptography 2018
Published 2021-09-01Subjects: “…cryptography…”
Get full text
Article -
3
Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures
Published 2021-07-01Subjects: “…cryptography…”
Get full text
Article -
4
Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives
Published 2024-06-01Subjects: Get full text
Article -
5
Efficient constructions for large‐state block ciphers based on AES New Instructions
Published 2022-05-01Subjects: “…AES‐NI, block cipher, cryptography, private key cryptography…”
Get full text
Article -
6
-
7
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
Published 2021-01-01Subjects: “…public key cryptography…”
Get full text
Article -
8
Revisit two memoryless state‐recovery cryptanalysis methods on A5/1
Published 2023-07-01Subjects: “…cryptography…”
Get full text
Article -
9
New attacks against reduced Rijndael‐160
Published 2022-01-01Subjects: “…cryptography…”
Get full text
Article -
10
Yoyo trick on type‐II generalised Feistel networks
Published 2021-11-01Subjects: “…cryptography…”
Get full text
Article -
11
Survey on blockchain privacy protection techniques in cryptography
Published 2022-08-01Subjects: Get full text
Article -
12
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Published 2021-01-01Subjects: “…cryptography…”
Get full text
Article -
13
ABE-IBS based signature-encryption method for WSN
Published 2010-01-01Subjects: “…attribute-based cryptography…”
Get full text
Article -
14
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system
Published 2021-01-01Subjects: “…cryptography…”
Get full text
Article -
15
-
16
User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment
Published 2025-01-01Subjects: “…cryptography…”
Get full text
Article -
17
Encrypt, sign, attack : a compact introduction to cryptography /
Published 2022Subjects: View in OPAC
Book -
18
A high speed processor for elliptic curve cryptography over NIST prime field
Published 2022-07-01Subjects: “…cryptography…”
Get full text
Article -
19
On-demand key management based on social attribute for opportunistic networks
Published 2012-12-01Subjects: Get full text
Article -
20