-
101
Construction and Research of Lightweight Cryptography SOPT-S Boxes Based on Inverse Mapping in Galois Field
Published 2014-04-01Subjects: “…lightweight cryptography…”
Get full text
Article -
102
Enhancing the Process of AES: A Lightweight Cryptography Algorithm AES for Ad-hoc Environments
Published 2022-12-01Subjects: Get full text
Article -
103
CDBS: blind signature scheme based on CRYSTALS-Dilithium algorithm
Published 2024-07-01Subjects: Get full text
Article -
104
RSA-based image recognizable adversarial attack method
Published 2021-10-01Subjects: Get full text
Article -
105
Quantum public-key encryption protocol based on single-photon
Published 2014-11-01Subjects: Get full text
Article -
106
Survey of digital signature technology based on error correcting codes
Published 2016-11-01Subjects: Get full text
Article -
107
Study of secret sharing schemes based on quantum theory
Published 2009-01-01Subjects: Get full text
Article -
108
Secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key
Published 2018-05-01Subjects: Get full text
Article -
109
Efficiency identity-based threshold group signature scheme
Published 2009-01-01Subjects: Get full text
Article -
110
Constructions of rotation symmetric 2-resilient functions with 4t<sub>-</sub>1 number of variables
Published 2020-11-01Subjects: “…cryptography…”
Get full text
Article -
111
Research and design of parallel architecture processor for elliptic curve cryptography
Published 2011-01-01Subjects: “…elliptic curve cryptography…”
Get full text
Article -
112
A compressive data gathering method based on El Gamal cryptography
Published 2019-12-01Subjects: Get full text
Article -
113
Certificateless generalized signcryption scheme in the standard model
Published 2017-04-01Subjects: “…certificateless cryptography…”
Get full text
Article -
114
Primitive polynomials and word oriented linear feedback shift registers
Published 2009-01-01Subjects: “…cryptography…”
Get full text
Article -
115
-
116
Construction and count of multi-output rotation symmetric resilient functions with 8 input variables
Published 2017-07-01Subjects: “…cryptography…”
Get full text
Article -
117
New bound of algebraic immunity of a class of Boolean function
Published 2016-10-01Subjects: “…cryptography…”
Get full text
Article -
118
The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field
Published 2022-01-01Subjects: “…Elliptic curve cryptography…”
Get full text
Article -
119
Rational-security and fair two-party comparison protocol
Published 2023-12-01Subjects: Get full text
Article -
120
Efficient and provably-secure certificateless sequential aggregate signature scheme
Published 2022-05-01Subjects: “…certificateless public key cryptography…”
Get full text
Article