-
1
Research on secret key generation based on wireless channel characteristics in body area network
Published 2021-12-01Subjects: “…channel reciprocity;secret key generation;WBAN;UWB…”
Get full text
Article -
2
Multiuser secret key generation based on received signal
Published 2018-10-01Subjects: “…secret key generation…”
Get full text
Article -
3
-
4
Biometry-based verification system with symmetric key generation method for internet of things environments
Published 2025-02-01Subjects: “…Symmetric key generation…”
Get full text
Article -
5
A Review of Artificial Intelligence (AI) Applications in Key Generation for Encryption Algorithms
Published 2025-03-01Subjects: “…AI Applications, key generation, encryption algorithms, string, image…”
Get full text
Article -
6
An interpolated quantized guard band algorithm for physical layer key generation
Published 2025-03-01Subjects: Get full text
Article -
7
A Modified Key Generation Algorithm to Rebalanced-RSA and RPower-RSA
Published 2024-12-01Subjects: Get full text
Article -
8
Enhancing IoT security with a DNA-based lightweight cryptography system
Published 2025-04-01Subjects: “…Key generation…”
Get full text
Article -
9
RSA based encryption approach for preserving confidentiality of big data
Published 2022-05-01Subjects: Get full text
Article -
10
AN IDEA FOR KNAPSACK CRYPTOSYSTEM BACKDOOR
Published 2025-07-01Subjects: “…public key cryptosystem, key generation, algorithmic attack, subliminal channel, kleptography.…”
Get full text
Article -
11
Enhanced Blockchain-based Key Generation using Butterfly Optimization Algorithm for Efficient Data Sharing in Cloud Computing
Published 2023-03-01Subjects: Get full text
Article -
12
-
13
Retina Based Glowworm Swarm Optimization for Random Cryptographic Key Generation
Published 2022-02-01Subjects: “…Retina, Glowworm Swarm Optimization (GSO), Chaotic map, Random cryptographic key generation…”
Get full text
Article -
14
Secure Key Distribution System Based on Optical Channel Physical Features
Published 2019-01-01Subjects: Get full text
Article -
15
New Technique using Fibonacci Matrices with Play-Fair System in Cryptography
Published 2022-11-01Subjects: Get full text
Article -
16
Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm
Published 2023-12-01Subjects: “…key generation…”
Get full text
Article -
17
Secure and Lightweight Cipher for Resource-constrained IoT Healthcare Applications using Snake Key Generation
Published 2025-03-01Subjects: “…IoT healthcare; blockchain technology; cryptographic key generation; data security; NIST randomness…”
Get full text
Article -
18
Securing Automatic Identification System Communications Using Physical-Layer Key Generation Protocol
Published 2025-02-01Subjects: “…physical-layer key generation…”
Get full text
Article -
19
Introducing Primality Testing Algorithm with an Implementation on 64 bits RSA Encryption Using Verilog
Published 2018-12-01Subjects: “…RSA, Verilog, Cryptosystem, Primality Testing, Decryption, Encryption, Implementation, Key Generation, Modular Exponentiation…”
Get full text
Article -
20
Channel-Based Dynamic Key Generation for Physical Layer Security in OFDM-PON Systems
Published 2021-01-01Subjects: Get full text
Article