-
21
Identity-based roaming protocol with anonymity for heterogeneous wireless networks
Published 2010-01-01Subjects: Get full text
Article -
22
Improvements on results of representation of elements in cyclotomic subgroup
Published 2007-01-01Subjects: “…public-key cryptosystem…”
Get full text
Article -
23
Performance Evaluation and Analysis of LightCert4IoT Using Cooja-Contiki Simulator
Published 2024-01-01Subjects: Get full text
Article -
24
Quantum public-key encryption protocol based on single-photon
Published 2014-11-01Subjects: “…public-key…”
Get full text
Article -
25
Provably secure and efficient escrowable public key encryption schemes
Published 2014-07-01Subjects: Get full text
Article -
26
A Secure and Scalable Authentication and Communication Protocol for Smart Grids
Published 2025-03-01Subjects: “…public key cryptography…”
Get full text
Article -
27
Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography
Published 2019-01-01Subjects: Get full text
Article -
28
Security analysis and improvement of strongly secure certificate less signature scheme
Published 2014-05-01Subjects: Get full text
Article -
29
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
Published 2024-01-01Subjects: “…Ciphertext, CRT, Cryptosystem, Plaintext, Playfair cipher, Private and public key, RSA cipher…”
Get full text
Article -
30
Review of Modular Multiplication Algorithms over Prime Fields for Public-Key Cryptosystems
Published 2025-06-01Subjects: “…public-key cryptosystems…”
Get full text
Article -
31
Efficient lattice‐based authenticated key exchange based on key encapsulation mechanism and signature
Published 2021-01-01Subjects: Get full text
Article -
32
Proxy re-signature scheme based on isomorphisms of polynomial
Published 2017-02-01Subjects: “…proxy re-signature;multivariate public key cryptosystem;isomorphisms of polynomial;affine transformation…”
Get full text
Article -
33
Forgery attacks on several certificateless signature schemes
Published 2020-06-01Subjects: Get full text
Article -
34
Efficient and provably-secure certificateless sequential aggregate signature scheme
Published 2022-05-01Subjects: “…certificateless public key cryptography;sequential aggregate signature;bilinear map;random oracle…”
Get full text
Article -
35
A compact public key encryption with equality test for lattice in cloud computing
Published 2025-07-01Subjects: Get full text
Article -
36
Secure Lattice-Based Signature Scheme for Internet of Things Applications
Published 2025-01-01Subjects: “…Certificateless public key cryptosystem…”
Get full text
Article -
37
Double-sided: tight proofs for guessing games in the quantum random oracle model
Published 2024-12-01Subjects: Get full text
Article -
38
SPKSE: secure public key searchable encryption withstand keyword guessing attacks
Published 2025-06-01Subjects: Get full text
Article -
39
Simple Matrix encryption scheme with variable ciphertext length
Published 2018-04-01Subjects: “…multivariable public key cryptography…”
Get full text
Article -
40
A New Approach Combining RSA and ElGamal Algorithms: Advancements in Encryption and Digital Signatures Using Gaussian Integers
Published 2025-03-01Subjects: “…combined rsa-elgamal public-key cryptosystem…”
Get full text
Article