-
1
Reconstructing a lightweight security protocol in the radio‐frequency identification systems
Published 2023-07-01Subjects: “…cryptographic protocols…”
Get full text
Article -
2
A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks
Published 2021-10-01Subjects: Get full text
Article -
3
Research on semantics of trust transitivity in cryptographic primitives
Published 2008-01-01Subjects: “…cryptographic primitives…”
Get full text
Article -
4
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
Published 2021-09-01Subjects: “…cryptographic protocols…”
Get full text
Article -
5
Research on affine equivalence enumeration of the three families vectorial function
Published 2017-11-01Subjects: Get full text
Article -
6
-
7
Cryptanalysis and improvement of a block cryptographic scheme based on logistic map
Published 2008-01-01Subjects: Get full text
Article -
8
-
9
Construction and analysis of one class of cryptographic functions
Published 2013-04-01Subjects: “…cryptographic functions…”
Get full text
Article -
10
Accelerating cryptographic computation with parallel computing mechanisms in Android platform
Published 2019-02-01Subjects: Get full text
Article -
11
Modeling the interrupt transmission process of SR-IOV cryptographic device
Published 2019-02-01Subjects: Get full text
Article -
12
Light block cipher algorithm for electric power industry
Published 2015-12-01Subjects: “…cryptographic technique…”
Get full text
Article -
13
Security evaluation against differential cryptanalysis for dynamic cryptographic structure
Published 2021-08-01Subjects: “…dynamic cryptographic structure…”
Get full text
Article -
14
-
15
Cryptographic service optimization scheduling algorithm for collaborative jobs in cloud environment
Published 2024-07-01Subjects: Get full text
Article -
16
Survey of braid-based cryptography
Published 2009-01-01Subjects: “…cryptographic scheme…”
Get full text
Article -
17
Electronic invoice public verification scheme based on SM2 coalition signature algorithm
Published 2022-04-01Subjects: Get full text
Article -
18
Research and implementation of reconfigurable SM4 cryptographic algorithm based on HRCA
Published 2020-10-01Subjects: Get full text
Article -
19
Biometric Fusion for Enhanced Authentication in Cloud Computing Environments
Published 2024-03-01Subjects: Get full text
Article -
20
Monitoring approach for online security of cryptographic protocol
Published 2016-06-01Subjects: “…cryptographic protocol identification…”
Get full text
Article