Found: 959
Select item for more details and to access through your institution.
Complete Analysis of Isogeny on Hessian Curve.
- Published in:
- IAENG International Journal of Computer Science, 2024, v. 51, n. 7, p. 906
- By:
- Publication type:
- Article
A novel and Fast hybrid design of cryptosystems for Image via 5-D chaos based random keys and DNA.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 20, p. 58495, doi. 10.1007/s11042-023-17742-3
- By:
- Publication type:
- Article
Blockchain-Based Quality Assurance System for Academic Programs.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 11, p. 4868, doi. 10.3390/app14114868
- By:
- Publication type:
- Article
Secure Encryption of Biomedical Images Based on Arneodo Chaotic System with the Lowest Fractional-Order Value.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 11, p. 2122, doi. 10.3390/electronics13112122
- By:
- Publication type:
- Article
Novel chaotic image cryptosystem using dynamic DNA coding.
- Published in:
- International Journal of Modern Physics C: Computational Physics & Physical Computation, 2024, v. 35, n. 6, p. 1, doi. 10.1142/S0129183124500682
- By:
- Publication type:
- Article
Cryptographic group and semigroup actions.
- Published in:
- Journal of Algebra & Its Applications, 2024, v. 23, n. 7, p. 1, doi. 10.1142/S0219498825300016
- By:
- Publication type:
- Article
ICFCM-MIE: Improved Cosine Fractional Chaotic Map based Medical Image Encryption.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 17, p. 52035, doi. 10.1007/s11042-023-17438-8
- By:
- Publication type:
- Article
Privacy-Preserving Confidential Reporting System With Designated Reporters.
- Published in:
- Computer Journal, 2024, v. 67, n. 5, p. 1951, doi. 10.1093/comjnl/bxad114
- By:
- Publication type:
- Article
Optimal Quaternary Hermitian LCD Codes.
- Published in:
- Entropy, 2024, v. 26, n. 5, p. 373, doi. 10.3390/e26050373
- By:
- Publication type:
- Article
An efficient and compromise-resilient image encryption scheme for resource-constrained environments.
- Published in:
- PLoS ONE, 2024, v. 19, n. 4, p. 1, doi. 10.1371/journal.pone.0297534
- By:
- Publication type:
- Article
PMNS for cryptography: A guided tour.
- Published in:
- Advances in Mathematics of Communications, 2024, v. 18, n. 2, p. 1, doi. 10.3934/amc.2023033
- By:
- Publication type:
- Article
A Lightweight Image Cryptosystem for Cloud-Assisted Internet of Things.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 7, p. 2808, doi. 10.3390/app14072808
- By:
- Publication type:
- Article
SM9 Identity-Based Encryption with Designated-Position Fuzzy Equality Test.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 7, p. 1256, doi. 10.3390/electronics13071256
- By:
- Publication type:
- Article
A Characterization of Generalized Boolean Functions Employed in CDMA Communications.
- Published in:
- International Journal of Mathematical, Engineering & Management Sciences, 2024, v. 9, n. 2, p. 352, doi. 10.33889/IJMEMS.2024.9.2.019
- By:
- Publication type:
- Article
Statistical Fault Analysis of Lightweight Tweakable Block Cipher QARMA in the Internet of Everything.
- Published in:
- Journal of Donghua University (English Edition), 2024, v. 41, n. 2, p. 172, doi. 10.19884/j.1672-5220.202305005
- By:
- Publication type:
- Article
Security Analysis of the Symmetric Cryptosystem TinyJambu.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 4, p. 440, doi. 10.3390/sym16040440
- By:
- Publication type:
- Article
A versatile chaotic cryptosystem with a novel substitution-permutation scheme for internet-of-drones photography.
- Published in:
- Nonlinear Dynamics, 2024, v. 112, n. 6, p. 4977, doi. 10.1007/s11071-024-09306-3
- By:
- Publication type:
- Article
Continued Fractions Applied to the One Line Factoring Algorithm for Breaking RSA.
- Published in:
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 1, p. 41, doi. 10.3390/jcp4010003
- By:
- Publication type:
- Article
Multiple single-channel cryptosystem based on QZ decomposition, CMYK color space fusion and wavelength multiplexing.
- Published in:
- Optical & Quantum Electronics, 2024, v. 56, n. 3, p. 1, doi. 10.1007/s11082-023-06001-2
- By:
- Publication type:
- Article
An algorithm for solving over-determined multivariate quadratic systems over finite fields.
- Published in:
- Advances in Mathematics of Communications, 2024, v. 18, n. 1, p. 1, doi. 10.3934/amc.2022001
- By:
- Publication type:
- Article
Systematic Trojan Detection in Crypto-Systems Using the Model Checker.
- Published in:
- Journal of Circuits, Systems & Computers, 2024, v. 33, n. 3, p. 1, doi. 10.1142/S0218126624500452
- By:
- Publication type:
- Article
On the security of image cryptosystems using DRPE based on scrambling and diffusion.
- Published in:
- Optical & Quantum Electronics, 2024, v. 56, n. 2, p. 1, doi. 10.1007/s11082-023-05689-6
- By:
- Publication type:
- Article
Optical Asymmetric Cryptosystem Based on Dynamic Foveated Imaging and Bidimensional Empirical Mode Decomposition.
- Published in:
- Photonics, 2024, v. 11, n. 2, p. 105, doi. 10.3390/photonics11020105
- By:
- Publication type:
- Article
A novel approach for designing secure substitution boxes based on Catalan number and elliptic curve.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 4, p. 10409, doi. 10.1007/s11042-023-15971-0
- By:
- Publication type:
- Article
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem.
- Published in:
- Baghdad Science Journal, 2024, v. 21, n. 1, p. 151, doi. 10.21123/bsj.2023.8361
- By:
- Publication type:
- Article
A High-Security Encryption Based on Hexadecnion Polynomials.
- Published in:
- International Journal of Mathematics & Computer Science, 2024, v. 19, n. 1, p. 37
- By:
- Publication type:
- Article
ECC Based Encryption for the Secured Proactive Network Forensic Framework.
- Published in:
- Iraqi Journal of Science, 2024, v. 65, n. 1, p. 381, doi. 10.24996/ijs.2024.65.1.31
- By:
- Publication type:
- Article
Secure information transmission using the fractional coupled Schrödinger model: a dynamical perspective.
- Published in:
- Optical & Quantum Electronics, 2023, v. 55, n. 14, p. 1, doi. 10.1007/s11082-023-05491-4
- By:
- Publication type:
- Article
Attacking cryptosystems by means of virus machines.
- Published in:
- Scientific Reports, 2023, v. 13, n. 1, p. 1, doi. 10.1038/s41598-023-49297-6
- By:
- Publication type:
- Article
Niederreiter cryptosystems using quasi-cyclic codes that resist quantum Fourier sampling.
- Published in:
- Advances in Mathematics of Communications, 2023, v. 17, n. 6, p. 1, doi. 10.3934/amc.2021062
- By:
- Publication type:
- Article
A Privacy-Preserving Scheme for Managing Secure Data in Healthcare System.
- Published in:
- Iraqi Journal for Electrical & Electronic Engineering, 2023, v. 19, n. 2, p. 70, doi. 10.37917/ijeee.19.2.9
- By:
- Publication type:
- Article
Ciphertext-only fault analysis on the LEA lightweight cipher.
- Published in:
- Journal of Donghua University (Natural Science Edition), 2023, v. 49, n. 6, p. 135, doi. 10.19886/j.cnki.dhdz.2022.0416
- By:
- Publication type:
- Article
The Efficiency of Embedding-Based Attacks on the GGH Lattice-Based Cryptosystem.
- Published in:
- Malaysian Journal of Mathematical Sciences, 2023, v. 17, n. 4, p. 673, doi. 10.47836/mjms.17.4.09
- By:
- Publication type:
- Article
Post-quantum distributed ledger technology: a systematic survey.
- Published in:
- Scientific Reports, 2023, v. 13, n. 1, p. 1, doi. 10.1038/s41598-023-47331-1
- By:
- Publication type:
- Article
Security-enhanced optical nonlinear cryptosystem based on phase-truncated Fourier transform.
- Published in:
- Optical & Quantum Electronics, 2023, v. 55, n. 12, p. 1, doi. 10.1007/s11082-023-05385-5
- By:
- Publication type:
- Article
Lattice-Based Cryptography: A Survey.
- Published in:
- Chinese Annals of Mathematics, 2023, v. 44, n. 6, p. 945, doi. 10.1007/s11401-023-0053-6
- By:
- Publication type:
- Article
An Efficient Heterogeneous Ring Signcryption Scheme for Wireless Body Area Networks.
- Published in:
- Computer Systems Science & Engineering, 2023, v. 47, n. 2, p. 2061, doi. 10.32604/csse.2023.040483
- By:
- Publication type:
- Article
On a Symmetric Image Cryptosystem Based on a Novel One-Dimensional Chaotic System and Banyan Network.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 21, p. 4411, doi. 10.3390/math11214411
- By:
- Publication type:
- Article
Interactive simulation of quantum key distribution protocols and application in Wi-Fi networks.
- Published in:
- Wireless Networks (10220038), 2023, v. 29, n. 8, p. 3781, doi. 10.1007/s11276-023-03438-x
- By:
- Publication type:
- Article
A novel image protection cryptosystem with only permutation stage: multi-shuffling process.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2023, v. 27, n. 20, p. 15319, doi. 10.1007/s00500-023-07970-y
- By:
- Publication type:
- Article
On matrix sequences represented by negative indices Pell and Pell–Lucas number with the decoding of Lucas blocking error correcting codes.
- Published in:
- Discrete Mathematics, Algorithms & Applications, 2023, v. 15, n. 7, p. 1, doi. 10.1142/S1793830922501543
- By:
- Publication type:
- Article
TRUFT: A New Public Key Cryptosystem Based on Novel FTH Algebra.
- Published in:
- International Journal of Mathematics & Computer Science, 2023, v. 18, n. 4, p. 589
- By:
- Publication type:
- Article
A Novel Internet of Medical Thing Cryptosystem Based on Jigsaw Transformation and Ikeda Chaotic Map.
- Published in:
- Computer Systems Science & Engineering, 2023, v. 46, n. 3, p. 3017, doi. 10.32604/csse.2023.037281
- By:
- Publication type:
- Article
Automated Classical Cipher Emulation Attacks via Unified Unsupervised Generative Adversarial Networks.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 3, p. 35, doi. 10.3390/cryptography7030035
- By:
- Publication type:
- Article
A New RSA Variant Based on Elliptic Curves.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 3, p. 37, doi. 10.3390/cryptography7030037
- By:
- Publication type:
- Article
Applications of Neural Network-Based AI in Cryptography.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 3, p. 39, doi. 10.3390/cryptography7030039
- By:
- Publication type:
- Article
A Novel and Secure Fake-Modulus Based Rabin-Ӡ Cryptosystem.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 3, p. 44, doi. 10.3390/cryptography7030044
- By:
- Publication type:
- Article
A New Idea for RSA Backdoors.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 3, p. 45, doi. 10.3390/cryptography7030045
- By:
- Publication type:
- Article
Novel Dynamic S-Box Based on Password Key and Circle Map.
- Published in:
- Iraqi Journal of Science, 2023, v. 64, n. 9, p. 4767, doi. 10.24996/ijs.2023.64.9.37
- By:
- Publication type:
- Article
Mayfly optimization with chaos-based image encryption technique for cloud computing environment.
- Published in:
- Journal of Electronic Imaging, 2023, v. 32, n. 5, p. 52303, doi. 10.1117/1.JEI.32.5.052303
- By:
- Publication type:
- Article