-
21
DIGITAL CURRENCY: A CONCEPTUAL FRAMEWORK OF PERFORMANCE
Published 2023-02-01Subjects: “…Cryptography, cryptocurrency, volume, market capitalization, price…”
Get full text
Article -
22
Analysis of the amplitude form of the quantum hash function
Published 2023-11-01Subjects: “…quantum cryptography…”
Get full text
Article -
23
Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
Published 2022-01-01Subjects: Get full text
Article -
24
In-depth study of lightweight block ciphers: Performance assessment and implementation on sensor motes
Published 2025-02-01Subjects: Get full text
Article -
25
Homomorphic Signature With Designated Evaluator
Published 2025-01-01Subjects: “…Cryptography…”
Get full text
Article -
26
MARPUF: physical unclonable function with improved machine learning attack resistance
Published 2021-08-01Subjects: “…cryptography…”
Get full text
Article -
27
Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants
Published 2021-11-01Subjects: Get full text
Article -
28
Medical Image Encryption and Decryption Based on DNA: A Survey
Published 2023-09-01Subjects: “…DNA Cryptography…”
Get full text
Article -
29
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01Subjects: Get full text
Article -
30
IoT enabled data protection with substitution box for lightweight ciphers
Published 2025-03-01Subjects: Get full text
Article -
31
Investigation of an attack on the multi-prime RSA cryptosystem based on cubic equations
Published 2023-11-01Subjects: “…asymmetric cryptography…”
Get full text
Article -
32
ECC-Based Authentication Protocol for Military Internet of Drone (IoD): A Holistic Security Framework
Published 2025-01-01Subjects: Get full text
Article -
33
FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review
Published 2021-03-01Subjects: “…Cryptography, DES algorithm, AES algorithm FPGAs Implementations, VHDL.…”
Get full text
Article -
34
GAN-based pseudo random number generation optimized through genetic algorithms
Published 2024-11-01Subjects: Get full text
Article -
35
Quantum Key Distribution Applicability to Smart Grid Cybersecurity Systems
Published 2025-01-01Subjects: “…symmetric and asymmetric cryptography…”
Get full text
Article -
36
Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment
Published 2021-05-01Subjects: Get full text
Article -
37
An Integrated Image Encryption Scheme Based on Elliptic Curve
Published 2023-01-01Subjects: Get full text
Article -
38
Performance evaluation of the SM4 cipher based on field‐programmable gate array implementation
Published 2021-03-01Subjects: “…cryptography…”
Get full text
Article -
39
Physical One‐Way Functions for Decentralized Consensus Via Proof of Physical Work
Published 2025-02-01Subjects: “…cryptography…”
Get full text
Article -
40
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search
Published 2023-05-01Subjects: Get full text
Article