Works matching Public key cryptography
1
- Wireless Personal Communications, 2015, v. 81, n. 2, p. 779, doi. 10.1007/s11277-014-2157-5
- Article
2
- Journal of Information Science & Engineering, 2010, v. 26, n. 5, p. 1859
- PO-JEN CHUANG;
- SHAO-HSUAN CHANG;
- CHIH-SHIN LIN
- Article
3
- Sādhanā: Academy Proceedings in Engineering Sciences, 2020, v. 45, n. 1, p. N.PAG, doi. 10.1007/s12046-020-01447-6
- Kundu, Nibedita;
- Debnath, Sumit Kumar;
- Mishra, Dheerendra
- Article
4
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 49, doi. 10.3390/cryptography7040049
- Soroceanu, Tudor;
- Buchmann, Nicolas;
- Margraf, Marian
- Article
5
- Computer Journal, 2017, v. 60, n. 8, p. 1197, doi. 10.1093/comjnl/bxx010
- Article
6
- Security & Communication Networks, 2014, v. 7, n. 4, p. 774, doi. 10.1002/sec.779
- Seo, Hwajeong;
- Lee, Yeoncheol;
- Kim, Hyunjin;
- Park, Taehwan;
- Kim, Howon
- Article
7
- Information Security Journal: A Global Perspective, 2010, v. 19, n. 5, p. 243, doi. 10.1080/19393555.2010.499799
- Tawalbeh, Lo'aiA.;
- Sweidan, Saadeh
- Article
8
- Journal of the Korea Institute of Information & Communication Engineering, 2023, v. 27, n. 6, p. 752, doi. 10.6109/jkiice.2023.27.6.752
- Article
9
- Wireless Personal Communications, 2023, v. 129, n. 2, p. 893, doi. 10.1007/s11277-022-10162-w
- Kaushik, Ajay;
- Vadlamani, Lakshmi Sai Srikar;
- Hussain, Mohammed Mohsin;
- Sahay, Milind;
- Singh, Rahul;
- Singh, Ananya Komal;
- Indu, S.;
- Goswami, Puneet;
- Kousik, Nalliyanna Goundar Veerappan
- Article
10
- Mathematics (2227-7390), 2020, v. 8, n. 5, p. 734, doi. 10.3390/math8050734
- Durán Díaz, Raúl;
- Hernández Encinas, Luis;
- Muñoz Masqué, Jaime
- Article
11
- Journal of Mathematical Modeling (JMM), 2023, v. 11, n. 4, p. 681, doi. 10.22124/JMM.2023.23982.2142
- Naseri, Azadeh Ramezanpour;
- Abbasi, Ahmad;
- Atani, Reza Ebrahimi
- Article
12
- Revista Vínculos, 2024, v. 21, n. 1, p. 1
- Article
13
- Journal of Algorithms & Computational Technology, 2024, v. 18, p. 1, doi. 10.1177/17483026241252407
- Haidary Makoui, Farshid;
- Gulliver, Thomas Aaron
- Article
14
- Journal of Cryptology, 2018, v. 31, n. 4, p. 1164, doi. 10.1007/s00145-018-9298-8
- Hutter, Michael;
- Wenger, Erich
- Article
15
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 2, p. 210, doi. 10.1049/ise2.12092
- Ikematsu, Yasuhiko;
- Nakamura, Shuhei;
- Takagi, Tsuyoshi
- Article
16
- Journal of Navigation, 2022, v. 75, n. 2, p. 333, doi. 10.1017/S0373463321000837
- Wimpenny, Gareth;
- Šafář, Jan;
- Grant, Alan;
- Bransby, Martin
- Article
17
- International Journal of Information Security, 2022, v. 21, n. 1, p. 103, doi. 10.1007/s10207-021-00543-w
- Article
18
- Integers: Electronic Journal of Combinatorial Number Theory, 2023, v. 23, p. 1, doi. 10.5281/zenodo.8349074
- Article
19
- 2022
- Astorga, Jasone;
- Barcelo, Marc;
- Urbieta, Aitor;
- Jacob, Eduardo
- Literature Review
20
- CTE Journal, 2019, v. 7, n. 2, p. 17
- Gondi, Vamsi;
- Hua, David;
- Bajracharya, Biju
- Article
21
- Technium, 2023, v. 6, p. 21, doi. 10.47577/technium.v5i.8238
- Article
22
- Technium, 2023, v. 5, p. 21, doi. 10.47577/technium.v5i.8238
- Article
23
- Journal of Information Science & Engineering, 2008, v. 24, n. 4, p. 1213
- Article
24
- Applied Sciences (2076-3417), 2022, v. 12, n. 15, p. 7401, doi. 10.3390/app12157401
- Huang, Huawei;
- Li, Chunhua;
- Deng, Lunzhi
- Article
25
- Math Horizons, 2021, v. 28, n. 2, p. 18, doi. 10.1080/10724117.2020.1814050
- Article
26
- Advances in Mechanical Engineering (Sage Publications Inc.), 2019, v. 11, n. 4, p. 1, doi. 10.1177/1687814019836838
- Weihong Huang;
- Renfa Li;
- Jianbo Xu;
- Yin Huang;
- Hosam, Osama
- Article
27
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1791, doi. 10.15866/irecos.v9i10.3781
- Raj Vincent, P. M. Durai;
- Sathiyamoorthy, E.
- Article
28
- Discrete Mathematics, Algorithms & Applications, 2018, v. 10, n. 6, p. N.PAG, doi. 10.1142/S1793830918500817
- Goswami, Pinkimani;
- Singh, Madan Mohan
- Article
29
- Multimedia Tools & Applications, 2021, v. 80, n. 21-23, p. 32023, doi. 10.1007/s11042-021-11202-6
- Karolin, M.;
- Meyyappan, T.
- Article
30
- International Journal of Theoretical Physics, 2022, v. 61, n. 8, p. 1, doi. 10.1007/s10773-022-05195-7
- Chen, Hui-Min;
- Jia, Heng-Yue;
- Wu, Xia;
- Wang, Xiu-Li
- Article
31
- Journal of Jilin University (Science Edition) / Jilin Daxue Xuebao (Lixue Ban), 2017, v. 55, n. 6, p. 1557, doi. 10.13413/j.cnki.jdxblxb.2017.06.38
- Article
32
- Wireless Personal Communications, 2014, v. 79, n. 1, p. 661, doi. 10.1007/s11277-014-1879-8
- Memon, Imran;
- Mohammed, Mohammed;
- Akhtar, Rizwan;
- Memon, Hina;
- Memon, Muhammad;
- Shaikh, Riaz
- Article
33
- Journal on Communication / Tongxin Xuebao, 2022, v. 43, n. 7, p. 62, doi. 10.11959/j.issn.1000−436x.2022130
- Article
34
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 912, doi. 10.3969/j.issn.1001-3695.2015.03.063
- Article
35
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 2, p. 196, doi. 10.1049/iet-ifs.2018.5288
- Duong, Dung Hoang;
- Van Luyen, Le;
- Tran, Ha Thanh Nguyen
- Article
36
- Wireless Personal Communications, 2015, v. 85, n. 3, p. 879, doi. 10.1007/s11277-015-2815-2
- Islam, SK;
- Singh, Abhishek
- Article
37
- Wireless Personal Communications, 2015, v. 82, n. 2, p. 1027, doi. 10.1007/s11277-014-2264-3
- Kumar, Abhimanyu;
- Tripathi, Sachin
- Article
38
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 300
- Meshram, Akshaykumar;
- Meshram, Chandrashekhar;
- Khobragade, N. W.
- Article
39
- Sensors (14248220), 2022, v. 22, n. 21, p. 8151, doi. 10.3390/s22218151
- Shamshad, Shuhab;
- Riaz, Farina;
- Riaz, Rabia;
- Rizvi, Sanam Shahla;
- Abdulla, Shahab
- Article
40
- Security & Communication Networks, 2015, v. 8, n. 13, p. 2214, doi. 10.1002/sec.1165
- Islam, SK Hafizul;
- Khan, Muhammad Khurram;
- Al-Khouri, Ali M.
- Article
41
- Journal of the Korea Institute of Information & Communication Engineering, 2025, v. 29, n. 6, p. 811, doi. 10.6109/jkiice.2025.29.6.811
- Article
42
- Electronics (2079-9292), 2025, v. 14, n. 12, p. 2399, doi. 10.3390/electronics14122399
- Zheng, Jiexin;
- Xu, Mudi;
- Li, Jianqing;
- Chen, Benfeng;
- Tan, Zhizhong;
- Wang, Anyu;
- Zhang, Shuo;
- Liu, Yan;
- Zhang, Kevin Qi;
- Zheng, Lirong;
- Wang, Wenyong
- Article
43
- Information Security Journal: A Global Perspective, 2023, v. 32, n. 1, p. 21, doi. 10.1080/19393555.2022.2047839
- Nait Hamoud, Othmane;
- Kenaza, Tayeb;
- Challal, Yacine;
- Ben-Abdelatif, Lina;
- Ouaked, Maroua
- Article
44
- Information Security Journal: A Global Perspective, 2022, v. 31, n. 5, p. 566, doi. 10.1080/19393555.2021.1919795
- Article
45
- Electronics Letters (Wiley-Blackwell), 2023, v. 59, n. 17, p. 1, doi. 10.1049/ell2.12901
- Aguilera, A. Cano;
- Clemente, X. Arnal i;
- Lawo, D.C.;
- Monroy, I. Tafur;
- Olmos, J.J. Vegas
- Article
46
- Scientific Research & Education in the Air Force - AFASES, 2014, v. 1, p. 367
- PURA, Mihai Lica;
- PATRICIU, Victor Valeriu
- Article
47
- Symmetry (20738994), 2022, v. 14, n. 11, p. 2378, doi. 10.3390/sym14112378
- Article
48
- Symmetry (20738994), 2018, v. 10, n. 1, p. 23, doi. 10.3390/sym10010023
- Tai, Wei-Liang;
- Chang, Ya-Fen
- Article
49
- Journal of Information Assurance & Security, 2015, v. 10, n. 1, p. 1
- Gayoso Martínez, V.;
- Hernández Encinas, L.
- Article
50
- Journal of Circuits, Systems & Computers, 2025, v. 34, n. 4, p. 1, doi. 10.1142/S0218126625500926
- Issad, M.;
- Anane, M.;
- Boudraa, B.
- Article