-
1
A Cryptosystem for Database Security Based on TSFS Algorithm
Published 2020-05-01Subjects: “…Cryptosystem, Database, Security, TSFS.…”
Get full text
Article -
2
An efficient method to generate elliptic curves
Published 2001-01-01Subjects: “…public key cryptosystem;elliptic curve generation…”
Get full text
Article -
3
-
4
Towards Analysable Chaos-based Cryptosystems: Constructing Difference Distribution Tables for Chaotic Maps
Published 2024-10-01Subjects: Get full text
Article -
5
ANALYSIS AND IMPLEMENTATION OF A CRYPTOSYSTEM BASED ON NON-INJECTIVE KNAPSACKS
Published 2025-07-01Subjects: “…np-completeness, knapsack problem, cryptography, knapsack cryptosystem.…”
Get full text
Article -
6
Analysis and improvement on identity-based cloud data integrity verification scheme
Published 2018-11-01Subjects: Get full text
Article -
7
A cryptosystem for face recognition based on optical interference and phase truncation theory
Published 2025-07-01Subjects: “…Cryptosystem…”
Get full text
Article -
8
Multi-function supported privacy protection data aggregation scheme for V2G network
Published 2023-04-01Subjects: Get full text
Article -
9
Multi-function supported privacy protection data aggregation scheme for V2G network
Published 2023-04-01Subjects: “…privacy protection;data aggregation;BGN homomorphic cryptosystem;consortium blockchain…”
Get full text
Article -
10
On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight
Published 2023-01-01Subjects: Get full text
Article -
11
Efficient signcryption scheme based on Cocks’ identity cryptosystem
Published 2020-12-01Subjects: Get full text
Article -
12
Efficient signcryption scheme based on Cocks’ identity cryptosystem
Published 2020-12-01Subjects: “…signcryption;Cocks’ identity cryptosystem;quadratic residue problem;provable security…”
Get full text
Article -
13
A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure
Published 2025-07-01Subjects: Get full text
Article -
14
Research on side-channel attacks and defense methods for IoT devices
Published 2025-02-01Subjects: Get full text
Article -
15
AN IDEA FOR KNAPSACK CRYPTOSYSTEM BACKDOOR
Published 2025-07-01Subjects: “…public key cryptosystem, key generation, algorithmic attack, subliminal channel, kleptography.…”
Get full text
Article -
16
Improvements on results of representation of elements in cyclotomic subgroup
Published 2007-01-01Subjects: “…public-key cryptosystem…”
Get full text
Article -
17
An advanced encryption system based on soft sets
Published 2024-11-01Subjects: Get full text
Article -
18
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
Published 2022-08-01Subjects: “…Chaotic Cryptosystem, Data Encryption, Double Layer Permutation, Key Image Generation…”
Get full text
Article -
19
Research on wormhole attacks in wireless mesh networks
Published 2011-01-01Subjects: Get full text
Article -
20
The Support Splitting Algorithm for Induced Codes
Published 2018-06-01Subjects: Get full text
Article