-
1
-
2
Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification
Published 2025-04-01Subjects: Get full text
Article -
3
Deep multi-biometric fuzzy commitment scheme: fusion methods and performance
Published 2025-07-01Subjects: “…Biometric cryptosystems…”
Get full text
Article -
4
-
5
Review of Modular Multiplication Algorithms over Prime Fields for Public-Key Cryptosystems
Published 2025-06-01Subjects: “…public-key cryptosystems…”
Get full text
Article -
6
Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data
Published 2025-03-01Subjects: Get full text
Article -
7
CRYPTANALYSIS BIOINSPIRED METHODS OF ASYMMETRIC KEY ON THE BASIS OF COMPOSITE NUMBER FACTORIZATION
Published 2011-11-01Subjects: Get full text
Article -
8
Encrypting Images Using the Sum of Functions of a Real Variable
Published 2025-01-01Subjects: “…Symmetric cryptosystems…”
Get full text
Article -
9
Fault analysis on elliptic curve cryptosystems with sliding window method
Published 2012-01-01Subjects: “…public key cryptography;elliptic curve cryptosystems;fault attacks;point multiplication;sliding window method;zero block failure…”
Get full text
Article -
10
A Comprehensive Review of MI-HFE and IPHFE Cryptosystems: Advances in Internal Perturbations for Post-Quantum Security
Published 2024-10-01Subjects: “…multivariate public key cryptosystems…”
Get full text
Article -
11
A Cryptosystem for Database Security Based on TSFS Algorithm
Published 2020-05-01Subjects: “…Cryptosystem, Database, Security, TSFS.…”
Get full text
Article -
12
An efficient method to generate elliptic curves
Published 2001-01-01Subjects: “…public key cryptosystem;elliptic curve generation…”
Get full text
Article -
13
-
14
Towards Analysable Chaos-based Cryptosystems: Constructing Difference Distribution Tables for Chaotic Maps
Published 2024-10-01Subjects: Get full text
Article -
15
ANALYSIS AND IMPLEMENTATION OF A CRYPTOSYSTEM BASED ON NON-INJECTIVE KNAPSACKS
Published 2025-07-01Subjects: “…np-completeness, knapsack problem, cryptography, knapsack cryptosystem.…”
Get full text
Article -
16
Analysis and improvement on identity-based cloud data integrity verification scheme
Published 2018-11-01Subjects: Get full text
Article -
17
A cryptosystem for face recognition based on optical interference and phase truncation theory
Published 2025-07-01Subjects: “…Cryptosystem…”
Get full text
Article -
18
Multi-function supported privacy protection data aggregation scheme for V2G network
Published 2023-04-01Subjects: Get full text
Article -
19
Multi-function supported privacy protection data aggregation scheme for V2G network
Published 2023-04-01Subjects: “…privacy protection;data aggregation;BGN homomorphic cryptosystem;consortium blockchain…”
Get full text
Article -
20
On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight
Published 2023-01-01Subjects: Get full text
Article