-
1
Revocable identity‐based matchmaking encryption in the standard model
Published 2023-07-01Subjects: “…cryptography…”
Get full text
Article -
2
Comment on ‘Targeted Ciphers for Format‐Preserving Encryption’ from Selected Areas in Cryptography 2018
Published 2021-09-01Subjects: “…cryptography…”
Get full text
Article -
3
Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures
Published 2021-07-01Subjects: “…cryptography…”
Get full text
Article -
4
Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives
Published 2024-06-01Subjects: Get full text
Article -
5
Efficient constructions for large‐state block ciphers based on AES New Instructions
Published 2022-05-01Subjects: “…AES‐NI, block cipher, cryptography, private key cryptography…”
Get full text
Article -
6
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
Published 2021-01-01Subjects: “…public key cryptography…”
Get full text
Article -
7
Revisit two memoryless state‐recovery cryptanalysis methods on A5/1
Published 2023-07-01Subjects: “…cryptography…”
Get full text
Article -
8
New attacks against reduced Rijndael‐160
Published 2022-01-01Subjects: “…cryptography…”
Get full text
Article -
9
Yoyo trick on type‐II generalised Feistel networks
Published 2021-11-01Subjects: “…cryptography…”
Get full text
Article -
10
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Published 2021-01-01Subjects: “…cryptography…”
Get full text
Article -
11
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system
Published 2021-01-01Subjects: “…cryptography…”
Get full text
Article -
12
-
13
Encrypt, sign, attack : a compact introduction to cryptography /
Published 2022Subjects: View in OPAC
Book -
14
A high speed processor for elliptic curve cryptography over NIST prime field
Published 2022-07-01Subjects: “…cryptography…”
Get full text
Article -
15
-
16
Exploiting statistical effective fault attack in a blind setting
Published 2023-07-01Subjects: “…cryptography…”
Get full text
Article -
17
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
Published 2021-09-01Subjects: Get full text
Article -
18
Indifferentiable hash functions in the standard model
Published 2021-07-01Subjects: “…cryptography…”
Get full text
Article -
19
New indifferentiability security proof of MDPH hash function
Published 2022-07-01Subjects: “…cryptography…”
Get full text
Article -
20
Implementation of Simplified Data Encryption Standard on FPGA using VHDL
Published 2022-03-01Subjects: “…Cryptography, DES, S-DES, FPGA, VHDL…”
Get full text
Article