Works matching IS 20082045 AND DT 2023 AND VI 15 AND IP 1
Results: 8
Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers.
- Published in:
- ISeCure, 2023, v. 15, n. 1, p. 137, doi. 10.22042/isecure.2022.275268.646
- By:
- Publication type:
- Article
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem.
- Published in:
- ISeCure, 2023, v. 15, n. 1, p. 125, doi. 10.22042/isecure.2022.293948.689
- By:
- Publication type:
- Article
4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices.
- Published in:
- ISeCure, 2023, v. 15, n. 1, p. 111, doi. 10.22042/isecure.2022.316014.724
- By:
- Publication type:
- Article
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT.
- Published in:
- ISeCure, 2023, v. 15, n. 1, p. 97, doi. 10.22042/isecure.2022.321360.738
- By:
- Publication type:
- Article
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon's Algorithm.
- Published in:
- ISeCure, 2023, v. 15, n. 1, p. 83, doi. 10.22042/ISECURE.2022.321346.739
- By:
- Publication type:
- Article
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain.
- Published in:
- ISeCure, 2023, v. 15, n. 1, p. 73, doi. 10.22042/ISECURE.2022.319074.729
- By:
- Publication type:
- Article
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware.
- Published in:
- ISeCure, 2023, v. 15, n. 1, p. 59, doi. 10.22042/ISECURE.2022.321436.741
- By:
- Publication type:
- Article
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art.
- Published in:
- ISeCure, 2023, v. 15, n. 1, p. 1, doi. 10.22042/ISECURE.2022.312328.718
- By:
- Publication type:
- Article