-
1
-
2
Exploring Post-Quantum Cryptography: Evaluating Algorithm Resilience against Global Quantum Threats
Published 2025-01-01Subjects: Get full text
Article -
3
Electronic invoice public verification scheme based on SM2 coalition signature algorithm
Published 2022-04-01Subjects: Get full text
Article -
4
An Identity Management Scheme Based on Multi-Factor Authentication and Dynamic Trust Evaluation for Telemedicine
Published 2025-03-01Subjects: Get full text
Article -
5
Hierarchical Multiparty Digital Signature for Distributed Systems: Application in Intelligent Vehicle Surveillance
Published 2025-05-01Subjects: Get full text
Article -
6
Innovative resource-saving security strategies for IoT devices
Published 2025-05-01Subjects: Get full text
Article -
7
Batch generated strongly nonlinear S-Boxes using enhanced quadratic maps
Published 2025-03-01Subjects: Get full text
Article -
8
A cross-chain model for warehouse receipts in port supply chain based on notary mechanism and ShangMi cryptographic algorithms
Published 2025-04-01Subjects: Get full text
Article -
9
The efficiency of crypt algorithms parallelization
Published 2019-06-01Subjects: Get full text
Article -
10
Symmetric Block Algorithm WBC1 and Analysis of Its Implementation Complexity
Published 2025-03-01Subjects: “…symmetric block cryptographic algorithm…”
Get full text
Article -
11
-
12
Provably secure and efficient escrowable public key encryption schemes
Published 2014-07-01Subjects: “…cryptographic algorithm…”
Get full text
Article -
13
Comparative analysis of NTRUEncrypt modified post-quantum cryptographic system and standard RSA cryptosystem
Published 2019-06-01Subjects: Get full text
Article -
14
Revocation encryption scheme based on domestic cryptographic algorithm SM9
Published 2025-05-01Subjects: Get full text
Article -
15
Traceable ring signature scheme based on domestic cryptographic algorithm SM9
Published 2025-03-01Subjects: Get full text
Article -
16
-
17
Complexity calculation of coding and information security system based on threshold secret sharing scheme used for electronic voting
Published 2017-10-01Subjects: Get full text
Article