Works matching Public-Key Cryptography
1
- Wireless Personal Communications, 2015, v. 81, n. 2, p. 779, doi. 10.1007/s11277-014-2157-5
- Article
2
- Computer Journal, 2017, v. 60, n. 8, p. 1197, doi. 10.1093/comjnl/bxx010
- Article
3
- Information Security Journal: A Global Perspective, 2010, v. 19, n. 5, p. 243, doi. 10.1080/19393555.2010.499799
- Tawalbeh, Lo'aiA.;
- Sweidan, Saadeh
- Article
4
- Security & Communication Networks, 2014, v. 7, n. 4, p. 774, doi. 10.1002/sec.779
- Seo, Hwajeong;
- Lee, Yeoncheol;
- Kim, Hyunjin;
- Park, Taehwan;
- Kim, Howon
- Article
5
- Sādhanā: Academy Proceedings in Engineering Sciences, 2020, v. 45, n. 1, p. N.PAG, doi. 10.1007/s12046-020-01447-6
- Kundu, Nibedita;
- Debnath, Sumit Kumar;
- Mishra, Dheerendra
- Article
6
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 49, doi. 10.3390/cryptography7040049
- Soroceanu, Tudor;
- Buchmann, Nicolas;
- Margraf, Marian
- Article
7
- Journal of Information Science & Engineering, 2010, v. 26, n. 5, p. 1859
- PO-JEN CHUANG;
- SHAO-HSUAN CHANG;
- CHIH-SHIN LIN
- Article
8
- Journal of the Korea Institute of Information & Communication Engineering, 2023, v. 27, n. 6, p. 752, doi. 10.6109/jkiice.2023.27.6.752
- Article
9
- Journal of Mathematical Modeling (JMM), 2023, v. 11, n. 4, p. 681, doi. 10.22124/JMM.2023.23982.2142
- Naseri, Azadeh Ramezanpour;
- Abbasi, Ahmad;
- Atani, Reza Ebrahimi
- Article
10
- Revista Vínculos, 2024, v. 21, n. 1, p. 1
- Article
11
- Mathematics (2227-7390), 2020, v. 8, n. 5, p. 734, doi. 10.3390/math8050734
- Durán Díaz, Raúl;
- Hernández Encinas, Luis;
- Muñoz Masqué, Jaime
- Article
12
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 2, p. 210, doi. 10.1049/ise2.12092
- Ikematsu, Yasuhiko;
- Nakamura, Shuhei;
- Takagi, Tsuyoshi
- Article
13
- CTE Journal, 2019, v. 7, n. 2, p. 17
- Gondi, Vamsi;
- Hua, David;
- Bajracharya, Biju
- Article
14
- Journal of Algorithms & Computational Technology, 2024, v. 18, p. 1, doi. 10.1177/17483026241252407
- Haidary Makoui, Farshid;
- Gulliver, Thomas Aaron
- Article
15
- Journal of Cryptology, 2018, v. 31, n. 4, p. 1164, doi. 10.1007/s00145-018-9298-8
- Hutter, Michael;
- Wenger, Erich
- Article
16
- Integers: Electronic Journal of Combinatorial Number Theory, 2023, v. 23, p. 1, doi. 10.5281/zenodo.8349074
- Article
17
- Journal of Navigation, 2022, v. 75, n. 2, p. 333, doi. 10.1017/S0373463321000837
- Wimpenny, Gareth;
- Šafář, Jan;
- Grant, Alan;
- Bransby, Martin
- Article
18
- 2022
- Astorga, Jasone;
- Barcelo, Marc;
- Urbieta, Aitor;
- Jacob, Eduardo
- Literature Review
19
- International Journal of Information Security, 2022, v. 21, n. 1, p. 103, doi. 10.1007/s10207-021-00543-w
- Article
20
- Discrete Mathematics, Algorithms & Applications, 2018, v. 10, n. 6, p. N.PAG, doi. 10.1142/S1793830918500817
- Goswami, Pinkimani;
- Singh, Madan Mohan
- Article
21
- Advances in Mechanical Engineering (Sage Publications Inc.), 2019, v. 11, n. 4, p. 1, doi. 10.1177/1687814019836838
- Weihong Huang;
- Renfa Li;
- Jianbo Xu;
- Yin Huang;
- Hosam, Osama
- Article
22
- Applied Sciences (2076-3417), 2022, v. 12, n. 15, p. 7401, doi. 10.3390/app12157401
- Huang, Huawei;
- Li, Chunhua;
- Deng, Lunzhi
- Article
23
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1791, doi. 10.15866/irecos.v9i10.3781
- Raj Vincent, P. M. Durai;
- Sathiyamoorthy, E.
- Article
24
- International Journal of Theoretical Physics, 2022, v. 61, n. 8, p. 1, doi. 10.1007/s10773-022-05195-7
- Chen, Hui-Min;
- Jia, Heng-Yue;
- Wu, Xia;
- Wang, Xiu-Li
- Article
25
- Multimedia Tools & Applications, 2021, v. 80, n. 21-23, p. 32023, doi. 10.1007/s11042-021-11202-6
- Karolin, M.;
- Meyyappan, T.
- Article
26
- Math Horizons, 2021, v. 28, n. 2, p. 18, doi. 10.1080/10724117.2020.1814050
- Article
27
- Technium, 2023, v. 6, p. 21, doi. 10.47577/technium.v5i.8238
- Article
28
- Technium, 2023, v. 5, p. 21, doi. 10.47577/technium.v5i.8238
- Article
29
- Journal of Information Science & Engineering, 2008, v. 24, n. 4, p. 1213
- Article
30
- Journal of Jilin University (Science Edition) / Jilin Daxue Xuebao (Lixue Ban), 2017, v. 55, n. 6, p. 1557, doi. 10.13413/j.cnki.jdxblxb.2017.06.38
- Article
31
- Wireless Personal Communications, 2014, v. 79, n. 1, p. 661, doi. 10.1007/s11277-014-1879-8
- Memon, Imran;
- Mohammed, Mohammed;
- Akhtar, Rizwan;
- Memon, Hina;
- Memon, Muhammad;
- Shaikh, Riaz
- Article
32
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 2, p. 196, doi. 10.1049/iet-ifs.2018.5288
- Duong, Dung Hoang;
- Van Luyen, Le;
- Tran, Ha Thanh Nguyen
- Article
33
- Journal on Communication / Tongxin Xuebao, 2022, v. 43, n. 7, p. 62, doi. 10.11959/j.issn.1000−436x.2022130
- Article
34
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 912, doi. 10.3969/j.issn.1001-3695.2015.03.063
- Article
35
- Security & Communication Networks, 2015, v. 8, n. 13, p. 2214, doi. 10.1002/sec.1165
- Islam, SK Hafizul;
- Khan, Muhammad Khurram;
- Al-Khouri, Ali M.
- Article
36
- Sensors (14248220), 2022, v. 22, n. 21, p. 8151, doi. 10.3390/s22218151
- Shamshad, Shuhab;
- Riaz, Farina;
- Riaz, Rabia;
- Rizvi, Sanam Shahla;
- Abdulla, Shahab
- Article
37
- Wireless Personal Communications, 2015, v. 85, n. 3, p. 879, doi. 10.1007/s11277-015-2815-2
- Islam, SK;
- Singh, Abhishek
- Article
38
- Wireless Personal Communications, 2015, v. 82, n. 2, p. 1027, doi. 10.1007/s11277-014-2264-3
- Kumar, Abhimanyu;
- Tripathi, Sachin
- Article
39
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 300
- Meshram, Akshaykumar;
- Meshram, Chandrashekhar;
- Khobragade, N. W.
- Article
40
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 1, p. 1, doi. 10.1049/iet-ifs.2014.0530
- Article
41
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 5, p. 273, doi. 10.1049/iet-ifs.2013.0062
- Guan, Chaowen;
- Weng, Jian;
- Deng, Robert H.;
- Chen, Minrong;
- Zhou, Dehua
- Article
42
- International Journal of Circuit Theory & Applications, 2017, v. 45, n. 2, p. 145, doi. 10.1002/cta.2296
- Acosta, Antonio J.;
- Addabbo, Tommaso;
- Tena‐Sánchez, Erica
- Article
43
- Symmetry (20738994), 2018, v. 10, n. 1, p. 23, doi. 10.3390/sym10010023
- Tai, Wei-Liang;
- Chang, Ya-Fen
- Article
44
- Electronics Letters (Wiley-Blackwell), 2023, v. 59, n. 17, p. 1, doi. 10.1049/ell2.12901
- Aguilera, A. Cano;
- Clemente, X. Arnal i;
- Lawo, D.C.;
- Monroy, I. Tafur;
- Olmos, J.J. Vegas
- Article
45
- Computer Journal, 2019, v. 62, n. 8, p. 1178, doi. 10.1093/comjnl/bxz041
- Rastegari, Parvin;
- Susilo, Willy;
- Dakhlalian, Mohammad
- Article
46
- Informatics in Education, 2024, v. 23, n. 1, p. 25, doi. 10.15388/infedu.2024.06
- BARTZIA, Evmorfia-Iro;
- LODI, Michael;
- SBARAGLIA, Marco;
- MODESTE, Simon;
- DURAND-GUERRIER, Viviane;
- MARTINI, Simone
- Article
47
- Journal of Optics (09728821), 2023, v. 52, n. 2, p. 527, doi. 10.1007/s12596-022-01011-x
- Wang, Miao;
- Yang, Xiulun;
- Meng, Xiangfeng;
- Wang, Yurong;
- Yin, Yongkai;
- Dong, Guoyan
- Article
48
- Quantum Information Processing, 2022, v. 21, n. 6, p. 1, doi. 10.1007/s11128-022-03541-6
- Wang, Yuqi;
- Chen, Geng;
- Jian, Liya;
- Zhou, Yi;
- Liu, Shiming
- Article
49
- Applied Sciences (2076-3417), 2020, v. 10, n. 4, p. 1539, doi. 10.3390/app10041539
- Article
50
- Journal of Circuits, Systems & Computers, 2025, v. 34, n. 4, p. 1, doi. 10.1142/S0218126625500926
- Issad, M.;
- Anane, M.;
- Boudraa, B.
- Article