Found: 62
Select item for more details and to access through your institution.
Depth-Optimized Quantum Circuits for ASCON: AEAD and HASH †.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 9, p. 1337, doi. 10.3390/math12091337
- By:
- Publication type:
- Article
Quantum Implementation of AIM: Aiming for Low-Depth.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 7, p. 2824, doi. 10.3390/app14072824
- By:
- Publication type:
- Article
Deep-Learning-Based Neural Distinguisher for Format-Preserving Encryption Schemes FF1 and FF3.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 7, p. 1196, doi. 10.3390/electronics13071196
- By:
- Publication type:
- Article
Optimized Quantum Circuit for Quantum Security Strength Analysis of Argon2.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 21, p. 4485, doi. 10.3390/electronics12214485
- By:
- Publication type:
- Article
NTT and Inverse NTT Quantum Circuits in CRYSTALS-Kyber for Post-Quantum Security Evaluation.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 18, p. 10373, doi. 10.3390/app131810373
- By:
- Publication type:
- Article
Malicious Contract Detection for Blockchain Network Using Lightweight Deep Learning Implemented through Explainable AI.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 18, p. 3893, doi. 10.3390/electronics12183893
- By:
- Publication type:
- Article
K-XMSS and K-SPHINCS + : Enhancing Security in Next-Generation Mobile Communication and Internet Systems with Hash Based Signatures Using Korean Cryptography Algorithms.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 17, p. 7558, doi. 10.3390/s23177558
- By:
- Publication type:
- Article
Optimized Implementation of Argon2 Utilizing the Graphics Processing Unit.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 16, p. 9295, doi. 10.3390/app13169295
- By:
- Publication type:
- Article
Deep-Learning-Based Cryptanalysis of Lightweight Block Ciphers Revisited.
- Published in:
- Entropy, 2023, v. 25, n. 7, p. 986, doi. 10.3390/e25070986
- By:
- Publication type:
- Article
Quantum Neural Network Based Distinguisher on SPECK-32/64.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 12, p. 5683, doi. 10.3390/s23125683
- By:
- Publication type:
- Article
Optimized Implementation and Analysis of CHAM in Quantum Computing.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 8, p. 5156, doi. 10.3390/app13085156
- By:
- Publication type:
- Article
Improved Low-Depth SHA3 Quantum Circuit for Fault-Tolerant Quantum Computers.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 6, p. 3558, doi. 10.3390/app13063558
- By:
- Publication type:
- Article
Quantum Binary Field Multiplication with Optimized Toffoli Depth and Extension to Quantum Inversion †.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 6, p. 3156, doi. 10.3390/s23063156
- By:
- Publication type:
- Article
Parallel Implementations of ARIA on ARM Processors and Graphics Processing Unit.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 23, p. 12246, doi. 10.3390/app122312246
- By:
- Publication type:
- Article
Efficient Implementation of SPEEDY Block Cipher on Cortex-M3 and RISC-V Microcontrollers †.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 22, p. 4236, doi. 10.3390/math10224236
- By:
- Publication type:
- Article
A Parallel Quantum Circuit Implementations of LSH Hash Function for Use with Grover's Algorithm.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 21, p. 10891, doi. 10.3390/app122110891
- By:
- Publication type:
- Article
DeepDetection: Privacy-Enhanced Deep Voice Detection and User Authentication for Preventing Voice Phishing.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 21, p. 11109, doi. 10.3390/app122111109
- By:
- Publication type:
- Article
Parallel quantum addition for Korean block ciphers.
- Published in:
- Quantum Information Processing, 2022, v. 21, n. 11, p. 1, doi. 10.1007/s11128-022-03714-3
- By:
- Publication type:
- Article
Optimized Implementation of Simpira on Microcontrollers for Secure Massive Learning.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 11, p. 2377, doi. 10.3390/sym14112377
- By:
- Publication type:
- Article
Secure and Robust Internet of Things with High-Speed Implementation of PRESENT and GIFT Block Ciphers on GPU.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 20, p. N.PAG, doi. 10.3390/app122010192
- By:
- Publication type:
- Article
SPEEDY Quantum Circuit for Grover's Algorithm.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 14, p. 6870, doi. 10.3390/app12146870
- By:
- Publication type:
- Article
Quantum implementation and resource estimates for Rectangle and Knot.
- Published in:
- Quantum Information Processing, 2021, v. 20, n. 12, p. 1, doi. 10.1007/s11128-021-03307-6
- By:
- Publication type:
- Article
Efficient Implementation of PRESENT and GIFT on Quantum Computers.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 11, p. 4776, doi. 10.3390/app11114776
- By:
- Publication type:
- Article
Masked Implementation of Format Preserving Encryption on Low-End AVR Microcontrollers and High-End ARM Processors.
- Published in:
- Mathematics (2227-7390), 2021, v. 9, n. 11, p. 1294, doi. 10.3390/math9111294
- By:
- Publication type:
- Article
Grover on PIPO.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 10, p. 1194, doi. 10.3390/electronics10101194
- By:
- Publication type:
- Article
Secure HIGHT Implementation on ARM Processors.
- Published in:
- Mathematics (2227-7390), 2021, v. 9, n. 9, p. 1044, doi. 10.3390/math9091044
- By:
- Publication type:
- Article
Compact Implementation of ARIA on 16-Bit MSP430 and 32-Bit ARM Cortex-M3 Microcontrollers.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 8, p. 908, doi. 10.3390/electronics10080908
- By:
- Publication type:
- Article
Convolutional Neural Network-Based Cryptography Ransomware Detection for Low-End Embedded Processors.
- Published in:
- Mathematics (2227-7390), 2021, v. 9, n. 7, p. 705, doi. 10.3390/math9070705
- By:
- Publication type:
- Article
High-Speed Implementation of PRESENT on AVR Microcontroller.
- Published in:
- Mathematics (2227-7390), 2021, v. 9, n. 4, p. 374, doi. 10.3390/math9040374
- By:
- Publication type:
- Article
Parallel Implementations of ARX-Based Block Ciphers on Graphic Processing Units.
- Published in:
- Mathematics (2227-7390), 2020, v. 8, n. 11, p. 1894, doi. 10.3390/math8111894
- By:
- Publication type:
- Article
Efficient Implementation of ARX-Based Block Ciphers on 8-Bit AVR Microcontrollers.
- Published in:
- Mathematics (2227-7390), 2020, v. 8, n. 10, p. 1837, doi. 10.3390/math8101837
- By:
- Publication type:
- Article
Grover on Korean Block Ciphers.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 18, p. 6407, doi. 10.3390/app10186407
- By:
- Publication type:
- Article
Designing a CHAM Block Cipher on Low-End Microcontrollers for Internet of Things.
- Published in:
- Electronics (2079-9292), 2020, v. 9, n. 9, p. 1548, doi. 10.3390/electronics9091548
- By:
- Publication type:
- Article
ASIC-Resistant Proof of Work Based on Power Analysis of Low-End Microcontrollers.
- Published in:
- Mathematics (2227-7390), 2020, v. 8, n. 8, p. 1343, doi. 10.3390/math8081343
- By:
- Publication type:
- Article
ACE: ARIA-CTR Encryption for Low-End Embedded Processors.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 13, p. 3788, doi. 10.3390/s20133788
- By:
- Publication type:
- Article
PAGE—Practical AES-GCM Encryption for Low-End Microcontrollers.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 9, p. 3131, doi. 10.3390/app10093131
- By:
- Publication type:
- Article
Fast Number Theoretic Transform for Ring-LWE on 8-bit AVR Embedded Processor.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 7, p. 2039, doi. 10.3390/s20072039
- By:
- Publication type:
- Article
Memory Efficient Implementation of Modular Multiplication for 32-bit ARM Cortex-M4.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 4, p. 1539, doi. 10.3390/app10041539
- By:
- Publication type:
- Article
Compact Implementations of HIGHT Block Cipher on IoT Platforms.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/5323578
- By:
- Publication type:
- Article
Compact implementations of Curve Ed448 on low‐end IoT platforms.
- Published in:
- ETRI Journal, 2019, v. 41, n. 6, p. 863, doi. 10.4218/etrij.2018-0445
- By:
- Publication type:
- Article
Hybrid approach of parallel implementation on CPU–GPU for high-speed ECDSA verification.
- Published in:
- Journal of Supercomputing, 2019, v. 75, n. 8, p. 4329, doi. 10.1007/s11227-019-02744-6
- By:
- Publication type:
- Article
Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/7012056
- By:
- Publication type:
- Article
Secure Data Encryption for Cloud-Based Human Care Services.
- Published in:
- Journal of Sensors, 2018, p. 1, doi. 10.1155/2018/6492592
- By:
- Publication type:
- Article
Secure IoT framework and 2D architecture for End-To-End security.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 8, p. 3521, doi. 10.1007/s11227-016-1684-0
- By:
- Publication type:
- Article
Erratum to: Secure IoT framework and 2D architecture for End-To-End security.
- Published in:
- 2018
- By:
- Publication type:
- Correction Notice
High Performance Implementation of SGCM on High-End IoT Devices.
- Published in:
- Journal of Information & Communication Convergence Engineering, 2017, v. 15, n. 4, p. 212, doi. 10.6109/jicce.2017.15.4.212
- By:
- Publication type:
- Article
Implementing RSA for sensor nodes in smart cities.
- Published in:
- Personal & Ubiquitous Computing, 2017, v. 21, n. 5, p. 807, doi. 10.1007/s00779-017-1044-y
- By:
- Publication type:
- Article
MoTE-ECC Based Encryption on MSP430.
- Published in:
- Journal of Information & Communication Convergence Engineering, 2017, v. 15, n. 3, p. 160, doi. 10.6109/jicce.2017.15.3.160
- By:
- Publication type:
- Article
The Application of REDOR NMR to Understand the Conformation of Epothilone B.
- Published in:
- International Journal of Molecular Sciences, 2017, v. 18, n. 7, p. 1472, doi. 10.3390/ijms18071472
- By:
- Publication type:
- Article
Hidden Indicator Based PIN-Entry Method Using Audio Signals.
- Published in:
- Journal of Information & Communication Convergence Engineering, 2017, v. 15, n. 2, p. 91, doi. 10.6109/jicce.2017.15.2.91
- By:
- Publication type:
- Article