Found: 12
Select item for more details and to access through your institution.
Public Key Protocols from Twisted-Skew Group Rings.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 3, p. 29, doi. 10.3390/cryptography8030029
- By:
- Publication type:
- Article
Public key cryptography based on twisted dihedral group algebras.
- Published in:
- Advances in Mathematics of Communications, 2024, v. 18, n. 3, p. 1, doi. 10.3934/amc.2022031
- By:
- Publication type:
- Article
Public Key Protocols over Skew Dihedral Group Rings.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 18, p. 3343, doi. 10.3390/math10183343
- By:
- Publication type:
- Article
On Proof-of-Accuracy Consensus Protocols.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 14, p. N.PAG, doi. 10.3390/math10142504
- By:
- Publication type:
- Article
Networks of Picture Processors with Filtering Based on Evaluation Sets as Solvers for Cryptographic Puzzles Based on Random Multivariate Quadratic Equations.
- Published in:
- Mathematics (2227-7390), 2020, v. 8, n. 12, p. 2160, doi. 10.3390/math8122160
- By:
- Publication type:
- Article
Training of Classification Models via Federated Learning and Homomorphic Encryption.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 4, p. 1966, doi. 10.3390/s23041966
- By:
- Publication type:
- Article
Continuous and Secure Integration Framework for Smart Contracts.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 1, p. 541, doi. 10.3390/s23010541
- By:
- Publication type:
- Article
On Detecting Cryptojacking on Websites: Revisiting the Use of Classifiers.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 23, p. 9219, doi. 10.3390/s22239219
- By:
- Publication type:
- Article
Password Guessability as a Service (PGaaS).
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 3, p. 1562, doi. 10.3390/app12031562
- By:
- Publication type:
- Article
Cold Boot Attacks on the Supersingular Isogeny Key Encapsulation (SIKE) Mechanism.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 1, p. 193, doi. 10.3390/app11010193
- By:
- Publication type:
- Article
Cold Boot Attacks on LUOV.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 12, p. 4106, doi. 10.3390/app10124106
- By:
- Publication type:
- Article
A Comprehensive Study of the Key Enumeration Problem.
- Published in:
- Entropy, 2019, v. 21, n. 10, p. 972, doi. 10.3390/e21100972
- By:
- Publication type:
- Article