-
1
Homomorphic signcryption with public plaintext‐result checkability
Published 2021-09-01Subjects: Get full text
Article -
2
Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures
Published 2021-05-01Subjects: Get full text
Article -
3
Towards an efficient LWE‐based fully homomorphic encryption scheme
Published 2022-07-01Subjects: Get full text
Article -
4
An efficient method to generate elliptic curves
Published 2001-01-01Subjects: “…public key cryptosystem;elliptic curve generation…”
Get full text
Article -
5
Lattice‐based cryptosystems in standardisation processes: A survey
Published 2023-03-01Subjects: Get full text
Article -
6
Public key searchable encryption scheme based on blockchain
Published 2020-04-01Subjects: Get full text
Article -
7
Quantum‐resistant anonymous identity‐based encryption with trable identities
Published 2022-03-01Subjects: Get full text
Article -
8
Public key searchable encryption scheme based on blockchain
Published 2020-04-01Subjects: “…searchable encryption;blockchain;smart contract;public key encryption…”
Get full text
Article -
9
-
10
Application of public key infrastructure in telecom operators
Published 2020-11-01Subjects: “…public key infrastructure…”
Get full text
Article -
11
Application of public key infrastructure in telecom operators
Published 2020-11-01Subjects: “…public key infrastructure;digital certificate;telecom operator;connectivity…”
Get full text
Article -
12
Blockchain-based high transparent PKI authentication protocol
Published 2022-08-01Subjects: Get full text
Article -
13
-
14
A Low-Cost PKC-Based RFID Mutual Authentication Protocol
Published 2013-10-01Subjects: Get full text
Article -
15
Cryptanalysis and improvement of several certificateless digital signature schemes
Published 2008-01-01Subjects: “…certificateless digital signature;public key substitution attack;bilinear pairings…”
Get full text
Article -
16
Computationally secure steganography based on speech synthesis
Published 2022-06-01Subjects: Get full text
Article -
17
Public-Key replacement attacks on lightweight authentication schemes for resource-constrained scenarios
Published 2025-12-01Subjects: Get full text
Article -
18
Security of the cryptosystems based on ergodic matrices
Published 2015-08-01Subjects: Get full text
Article -
19
Enhancing IoT security with a DNA-based lightweight cryptography system
Published 2025-04-01Subjects: Get full text
Article -
20
AN IDEA FOR KNAPSACK CRYPTOSYSTEM BACKDOOR
Published 2025-07-01Subjects: “…public key cryptosystem, key generation, algorithmic attack, subliminal channel, kleptography.…”
Get full text
Article