-
41
Enhancing the Process of AES: A Lightweight Cryptography Algorithm AES for Ad-hoc Environments
Published 2022-12-01Subjects: Get full text
Article -
42
The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field
Published 2022-01-01Subjects: “…Elliptic curve cryptography…”
Get full text
Article -
43
Authenticated encryption mode with blocks skipping
Published 2021-10-01Subjects: “…cryptography…”
Get full text
Article -
44
Accelerating the SM3 hash algorithm with CPU‐FPGA Co‐Designed architecture
Published 2021-11-01Subjects: Get full text
Article -
45
An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)
Published 2024-12-01Subjects: Get full text
Article -
46
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Published 2025-01-01Subjects: Get full text
Article -
47
Unimodal‐Bio‐GAN: Keyless biometric salting scheme based on generative adversarial network
Published 2021-11-01Subjects: Get full text
Article -
48
-
49
Intelligent physiological signal infosecurity: Case study in photoplethysmography (PPG) signal
Published 2022-05-01Subjects: Get full text
Article -
50
A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review
Published 2024-01-01Subjects: “…Cryptography…”
Get full text
Article -
51
Improved lattice‐based mix‐nets for electronic voting
Published 2023-01-01Subjects: “…lattice‐based post‐quantum cryptography…”
Get full text
Article -
52
Strengthened 32‐bit AES implementation: Architectural error correction configuration with a new voting scheme
Published 2021-11-01Subjects: “…cryptography…”
Get full text
Article -
53
A Secure and Efficient White-Box Implementation of SM4
Published 2024-12-01Subjects: Get full text
Article -
54
Si Substrate Backside—An Emerging Physical Attack Surface for Secure ICs in Flip Chip Packaging
Published 2024-01-01Subjects: Get full text
Article -
55
qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era
Published 2025-01-01Subjects: Get full text
Article -
56
Design of a Multi-Layer Symmetric Encryption System Using Reversible Cellular Automata
Published 2025-01-01Subjects: Get full text
Article -
57
An improved sunflower optimization algorithm for cluster selection with secured data transmission using cryptographic techniques in WSNS-IoT
Published 2024-01-01Subjects: Get full text
Article -
58
Beyond full‐bit secure authenticated encryption without input‐length limitation
Published 2022-07-01Subjects: Get full text
Article -
59
Unique Information Through the Lens of Channel Ordering: An Introduction and Review
Published 2025-01-01Subjects: “…information-theoretic cryptography…”
Get full text
Article -
60
2D physically unclonable functions of the arbiter type
Published 2023-03-01Subjects: “…physical cryptography…”
Get full text
Article