-
81
Verifiable access control scheme based on unpaired CP-ABE in fog computing
Published 2021-08-01Subjects: Get full text
Article -
82
Performance evaluation of the SM4 cipher based on field‐programmable gate array implementation
Published 2021-03-01Subjects: “…cryptography…”
Get full text
Article -
83
Physical One‐Way Functions for Decentralized Consensus Via Proof of Physical Work
Published 2025-02-01Subjects: “…cryptography…”
Get full text
Article -
84
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
Published 2016-05-01Subjects: Get full text
Article -
85
De la logique à l’algorithme : la traduction dans le design de programmes
Published 2022-07-01Subjects: Get full text
Article -
86
Generalized Centered Binomial Distribution for Bimodal Lattice Signatures
Published 2025-01-01Subjects: “…Post-quantum cryptography…”
Get full text
Article -
87
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search
Published 2023-05-01Subjects: Get full text
Article -
88
Hierarchical location-diversity-based low-delay anonymous communication framework
Published 2009-01-01Subjects: “…cryptography…”
Get full text
Article -
89
Multi-authority attribute-based identification scheme
Published 2021-03-01Subjects: Get full text
Article -
90
Security of the cryptosystems based on ergodic matrices
Published 2015-08-01Subjects: Get full text
Article -
91
Realization of smart home key management mechanism based on ECC
Published 2017-06-01Subjects: Get full text
Article -
92
Identification on the structures of block ciphers using machine learning
Published 2023-06-01Subjects: Get full text
Article -
93
Identity-based roaming protocol with anonymity for heterogeneous wireless networks
Published 2010-01-01Subjects: “…identity-based public key cryptography…”
Get full text
Article -
94
Privacy protection of warning message publishing protocol in VANET
Published 2021-08-01Subjects: Get full text
Article -
95
Secure Biometric Verification in the Presence of Malicious Adversaries
Published 2025-01-01Subjects: Get full text
Article -
96
Cross-domain authentication scheme based on consortium blockchain
Published 2022-06-01Subjects: Get full text
Article -
97
Note on the channel capacity of narrowband subliminal channels in one-way function
Published 2009-01-01Subjects: “…cryptography…”
Get full text
Article -
98
A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Cryptography
Published 2025-01-01Subjects: Get full text
Article -
99
Saber With Hybrid Striding Toom Cook-Based Multiplier: Implementation Using Open-Source Tool Flow and Industry Standard Chip Design Tools
Published 2025-01-01Subjects: Get full text
Article -
100
Novel identity-based fully homomorphic encryption scheme from lattice
Published 2017-05-01Subjects: Get full text
Article