-
61
ID-based wireless authentication scheme with anonymity
Published 2009-01-01Subjects: “…cryptography…”
Get full text
Article -
62
Identity-based cloud storage integrity checking from lattices
Published 2019-04-01Subjects: Get full text
Article -
63
Progress and Security Analysis of Quantum Cryptography Communication
Published 2015-06-01Subjects: “…quantum cryptography communication…”
Get full text
Article -
64
FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review
Published 2021-03-01Subjects: “…Cryptography, DES algorithm, AES algorithm FPGAs Implementations, VHDL.…”
Get full text
Article -
65
-
66
About permutations on the sets of tuples from elements of the finite field
Published 2019-06-01Subjects: “…cryptography…”
Get full text
Article -
67
Lossless sharing visual cryptography
Published 2013-03-01Subjects: “…isual cryptography…”
Get full text
Article -
68
Identity-based cross-domain authentication scheme in pervasive computing environments
Published 2011-01-01Subjects: Get full text
Article -
69
Configurable radix-4 NTT hardware optimization and implementation for lattice-based cryptography
Published 2024-10-01Subjects: Get full text
Article -
70
Identity-based group key management scheme for space networks
Published 2010-01-01Subjects: Get full text
Article -
71
GAN-based pseudo random number generation optimized through genetic algorithms
Published 2024-11-01Subjects: Get full text
Article -
72
Provably secure certificate less blind proxy re-signatures
Published 2012-09-01Subjects: “…certificateless cryptography…”
Get full text
Article -
73
Design and implementation of secure Windows platform based on TCM
Published 2015-08-01Subjects: Get full text
Article -
74
Quantum Key Distribution Applicability to Smart Grid Cybersecurity Systems
Published 2025-01-01Subjects: “…symmetric and asymmetric cryptography…”
Get full text
Article -
75
Ein neuer Fund um die Chymische Hochzeit aus der späteren Korrespondenz Johann Valentin Andreaes
Published 2018-07-01Subjects: Get full text
Article -
76
Breaking the HFEM public key scheme
Published 2013-03-01Subjects: “…post-quantum cryptography…”
Get full text
Article -
77
Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment
Published 2021-05-01Subjects: Get full text
Article -
78
An Integrated Image Encryption Scheme Based on Elliptic Curve
Published 2023-01-01Subjects: Get full text
Article -
79
Summary and study on the curriculum reform of modern cryptography based on SPOC and flip classroom
Published 2019-06-01Subjects: “…modern cryptography…”
Get full text
Article -
80
A Low-Cost PKC-Based RFID Mutual Authentication Protocol
Published 2013-10-01Subjects: Get full text
Article