Works matching Cryptography
Results: 5000
後量子密碼標準發展及運用分析.
- Published in:
- Journal of Advanced Technology & Management, 2024, v. 13, n. 1, p. 21, doi. 10.6193/JATM.202411_13(1).0002
- By:
- Publication type:
- Article
RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique.
- Published in:
- Journal of Circuits, Systems & Computers, 2016, v. 25, n. 11, p. -1, doi. 10.1142/S0218126616501383
- By:
- Publication type:
- Article
A novel approach for dual layer security of message using Steganography and Cryptography.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 15, p. 20669, doi. 10.1007/s11042-022-12084-y
- By:
- Publication type:
- Article
A Mathematical Perspective on Post-Quantum Cryptography.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 15, p. 2579, doi. 10.3390/math10152579
- By:
- Publication type:
- Article
A Secure Cryptography Based Clustering Mechanism for Improving the Data Transmission in MANET.
- Published in:
- Walailak Journal of Science & Technology, 2021, v. 18, n. 6, p. 1, doi. 10.48048/wjst.2021.8987
- By:
- Publication type:
- Article
Comparación entre Varios Esquemas de Criptografía Visual Extendida.
- Published in:
- Información Tecnológica, 2012, v. 23, n. 4, p. 105, doi. 10.4067/S0718-07642012000400013
- By:
- Publication type:
- Article
КРИПТОГРАФІЯ ПІСЛЯ КВАНТОВОЇ ЕРИ: НОВІ ВИКЛИКИ ТА РІШЕННЯ ДЛЯ ІНФОРМАЦІЙНОЇ БЕЗПЕКИ
- Published in:
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2024, v. 14, n. 3, p. 183, doi. 10.15276/imms.v14.no3.183
- By:
- Publication type:
- Article
Enhanced cryptography techniques using inherited process with cyclic crossover operation in big data.
- Published in:
- International Journal of Modeling, Simulation & Scientific Computing, 2024, v. 15, n. 5, p. 1, doi. 10.1142/S1793962324500375
- By:
- Publication type:
- Article
Enhanced Performance of Isogenies Over Huff Curve for Post Quantum Cryptography.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2023, v. 16, n. 6, p. 445, doi. 10.22266/ijies2023.1231.37
- By:
- Publication type:
- Article
DNA Cryptography: New Field of Cryptography.
- Published in:
- Journal of Network & Information Security, 2018, v. 6, n. 1, p. 30
- By:
- Publication type:
- Article
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetry key.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2023, v. 13, n. 2, p. 1734, doi. 10.11591/ijece.v13i2.pp1734-1743
- By:
- Publication type:
- Article
Hybrid cryptography security in public cloud using TwoFish and ECC algorithm.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2019, v. 9, n. 4, p. 2578, doi. 10.11591/ijece.v9i4.pp2578-2584
- By:
- Publication type:
- Article
Embedded electronic circuits for cryptography, hardware security and true random number generation: an overview.
- Published in:
- International Journal of Circuit Theory & Applications, 2017, v. 45, n. 2, p. 145, doi. 10.1002/cta.2296
- By:
- Publication type:
- Article
Post Quantum Public and Private Key Cryptography Optimized for IoT Security.
- Published in:
- Wireless Personal Communications, 2023, v. 129, n. 2, p. 893, doi. 10.1007/s11277-022-10162-w
- By:
- Publication type:
- Article
Breaking Barriers in Conventional Cryptography by Integrating with Quantum Key Distribution.
- Published in:
- Wireless Personal Communications, 2023, v. 129, n. 1, p. 549, doi. 10.1007/s11277-022-10110-8
- By:
- Publication type:
- Article
Lightweight Cryptography: A Solution to Secure IoT.
- Published in:
- Wireless Personal Communications, 2020, v. 112, n. 3, p. 1947, doi. 10.1007/s11277-020-07134-3
- By:
- Publication type:
- Article
Inverse matrices with applications in public-key cryptography.
- Published in:
- Journal of Algorithms & Computational Technology, 2024, v. 18, p. 1, doi. 10.1177/17483026241252407
- By:
- Publication type:
- Article
The Usefulness Of Visual Cryptography Techniques: A Literature Review.
- Published in:
- Webology, 2022, v. 19, n. 3, p. 3016
- By:
- Publication type:
- Article
An Optimized Halftone Visual Cryptography Scheme Using Error Diffusion.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 19, p. 24937, doi. 10.1007/s11042-018-5724-z
- By:
- Publication type:
- Article
VMVC: Verifiable multi-tone visual cryptography.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 5, p. 5169, doi. 10.1007/s11042-017-4422-6
- By:
- Publication type:
- Article
Karatsuba-Block-Comb technique for elliptic curve cryptography over binary fields.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 17, p. 3121, doi. 10.1002/sec.1237
- By:
- Publication type:
- Article
Hybrid Algorithm using Color Image Visual Cryptography, Vector Stegnography and Random Key Cryptography for Digital Image, E-Stamp and Digital Signature Authentication.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 2786
- By:
- Publication type:
- Article
Advanced Password Authentication Protection by Hybrid Cryptography & Audio Steganography.
- Published in:
- Iraqi Journal of Science, 2018, v. 59, n. 1C, p. 600, doi. 10.24996/ijs.2018.59.1C.17
- By:
- Publication type:
- Article
Visual Cryptography Secret Share Creation Techniques with Multiple Image Encryption and Decryption Using Elliptic Curve Cryptography.
- Published in:
- IETE Journal of Research, 2024, v. 70, n. 2, p. 1638, doi. 10.1080/03772063.2022.2142684
- By:
- Publication type:
- Article
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 12, p. 5379, doi. 10.3390/s23125379
- By:
- Publication type:
- Article
1-out-of-2: post-quantum oblivious transfer protocols based on multivariate public key cryptography.
- Published in:
- Sādhanā: Academy Proceedings in Engineering Sciences, 2020, v. 45, n. 1, p. N.PAG, doi. 10.1007/s12046-020-01447-6
- By:
- Publication type:
- Article
A High-Efficiency Modular Multiplication Digital Signal Processing for Lattice-Based Post-Quantum Cryptography.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 46, doi. 10.3390/cryptography7040046
- By:
- Publication type:
- Article
Design of Polynomial NTT and INTT Accelerator for Post-Quantum Cryptography CRYSTALS-Kyber.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2023, v. 48, n. 2, p. 1527, doi. 10.1007/s13369-022-06928-w
- By:
- Publication type:
- Article
A TTP watermarking protocol based on visual cryptography.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 28, p. 41079, doi. 10.1007/s11042-022-13002-y
- By:
- Publication type:
- Article
A robust and secure zero-watermarking copyright authentication scheme based on visual cryptography and block G-H feature.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 26, p. 38019, doi. 10.1007/s11042-022-13136-z
- By:
- Publication type:
- Article
Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process.
- Published in:
- Technologies (2227-7080), 2024, v. 12, n. 12, p. 241, doi. 10.3390/technologies12120241
- By:
- Publication type:
- Article
Mathematically Based Assessment of the Accuracy of Protection of Cardiac Data Realized with the Help of Cryptography and Steganography.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 3, p. 390, doi. 10.3390/math10030390
- By:
- Publication type:
- Article
漫談輕量級密碼學標準發展與實現.
- Published in:
- Journal of Advanced Technology & Management, 2023, v. 11, n. 2, p. 28, doi. 10.6193/JATM.202305_11(2).0002
- By:
- Publication type:
- Article
An Efficient Medical Image Watermarking Technique in E-healthcare Application Using Hybridization of Compression and Cryptography Algorithm.
- Published in:
- Journal of Intelligent Systems, 2018, v. 27, n. 1, p. 115, doi. 10.1515/jisys-2017-0266
- By:
- Publication type:
- Article
Overcoming Alignment Problem in Non-Identical Mathematical Support Visual Cryptography Schemes.
- Published in:
- Journal of ICT Research & Applications, 2018, v. 12, n. 1, p. 87, doi. 10.5614/itbj.ict.res.appl.2018.12.1.6
- By:
- Publication type:
- Article
Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme.
- Published in:
- Future Internet, 2023, v. 15, n. 3, p. 99, doi. 10.3390/fi15030099
- By:
- Publication type:
- Article
Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol.
- Published in:
- Future Internet, 2022, v. 14, n. 8, p. 232, doi. 10.3390/fi14080232
- By:
- Publication type:
- Article
Security in Wireless Sensor Networks: A Cryptography Performance Analysis at MAC Layer.
- Published in:
- Future Internet, 2022, v. 14, n. 5, p. 145, doi. 10.3390/fi14050145
- By:
- Publication type:
- Article
Flip Extended Visual Cryptography for Gray-Scale and Color Cover Images.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 1, p. 65, doi. 10.3390/sym13010065
- By:
- Publication type:
- Article
FROM THEORY TO PRACTICE: THE ROLE OF CRYPTOGRAPHY IN SECURING BLOCKCHAIN NETWORKS.
- Published in:
- MEST Journal, 2024, v. 12, n. 2, p. 93, doi. 10.12709/mest.12.12.02.12
- By:
- Publication type:
- Article
Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 4, p. 2987, doi. 10.1007/s11276-024-03714-4
- By:
- Publication type:
- Article
Improved elliptical curve cryptography and chaotic mapping with fruitfly optimization algorithm for secure data transmission.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 3, p. 1151, doi. 10.1007/s11276-023-03554-8
- By:
- Publication type:
- Article
An elliptic curve cryptography based certificate-less signature aggregation scheme for efficient authentication in vehicular ad hoc networks.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 1, p. 335, doi. 10.1007/s11276-023-03473-8
- By:
- Publication type:
- Article
An Unplugged Didactical Situation on Cryptography between Informatics and Mathematics.
- Published in:
- Informatics in Education, 2024, v. 23, n. 1, p. 25, doi. 10.15388/infedu.2024.06
- By:
- Publication type:
- Article
Ring learning with errors: a crossroads between post-quantum cryptography, machine learning and number theory.
- Published in:
- Bulletin of the Irish Mathematical Society, 2020, n. 86, p. 17, doi. 10.33232/bims.0086.17.46
- By:
- Publication type:
- Article
Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 4, p. 1442, doi. 10.1007/s00145-020-09351-2
- By:
- Publication type:
- Article
Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors.
- Published in:
- Journal of Cryptology, 2018, v. 31, n. 4, p. 1164, doi. 10.1007/s00145-018-9298-8
- By:
- Publication type:
- Article
Image Cryptography Based on Confusion and Diffusion Using 6D Hyper Chaotic System and Fibonacci Q-matrix.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2024, v. 17, n. 4, p. 944, doi. 10.22266/ijies2024.0831.71
- By:
- Publication type:
- Article
Effective Load Balancing and Security in Cloud using Modified Particle Swarm Optimization Technique and Enhanced Elliptic Curve Cryptography Algorithm.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2022, v. 15, n. 2, p. 190, doi. 10.22266/ijies2022.0430.18
- By:
- Publication type:
- Article
Review of current methods of quantum and post-quantum cryptography.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 236, doi. 10.18372/2225-5036.20.7549
- By:
- Publication type:
- Article