-
1
The efficiency of crypt algorithms parallelization
Published 2019-06-01Subjects: Get full text
Article -
2
Symmetric Block Algorithm WBC1 and Analysis of Its Implementation Complexity
Published 2025-03-01Subjects: “…symmetric block cryptographic algorithm…”
Get full text
Article -
3
-
4
Provably secure and efficient escrowable public key encryption schemes
Published 2014-07-01Subjects: “…cryptographic algorithm…”
Get full text
Article -
5
Comparative analysis of NTRUEncrypt modified post-quantum cryptographic system and standard RSA cryptosystem
Published 2019-06-01Subjects: Get full text
Article -
6
Revocation encryption scheme based on domestic cryptographic algorithm SM9
Published 2025-05-01Subjects: Get full text
Article -
7
Traceable ring signature scheme based on domestic cryptographic algorithm SM9
Published 2025-03-01Subjects: Get full text
Article -
8
-
9
-
10
Exploring Post-Quantum Cryptography: Evaluating Algorithm Resilience against Global Quantum Threats
Published 2025-01-01Subjects: Get full text
Article -
11
Electronic invoice public verification scheme based on SM2 coalition signature algorithm
Published 2022-04-01Subjects: Get full text
Article -
12
An Identity Management Scheme Based on Multi-Factor Authentication and Dynamic Trust Evaluation for Telemedicine
Published 2025-03-01Subjects: Get full text
Article -
13
Hierarchical Multiparty Digital Signature for Distributed Systems: Application in Intelligent Vehicle Surveillance
Published 2025-05-01Subjects: Get full text
Article -
14
Innovative resource-saving security strategies for IoT devices
Published 2025-05-01Subjects: Get full text
Article -
15
Batch generated strongly nonlinear S-Boxes using enhanced quadratic maps
Published 2025-03-01Subjects: Get full text
Article -
16
A cross-chain model for warehouse receipts in port supply chain based on notary mechanism and ShangMi cryptographic algorithms
Published 2025-04-01Subjects: Get full text
Article -
17
Complexity calculation of coding and information security system based on threshold secret sharing scheme used for electronic voting
Published 2017-10-01Subjects: Get full text
Article