Found: 16
Select item for more details and to access through your institution.
A Conditional Privacy-Preserving Batch Authentication Scheme Based on Certificateless Aggregate Signature for VANETs.
- Published in:
- Journal of Cryptologic Research (2095-7025), 2023, v. 10, n. 3, p. 462, doi. 10.13868/j.cnki.jcr.000605
- By:
- Publication type:
- Article
Quantum Period Attack and Quantum Truncation Attack on OTR Scheme.
- Published in:
- Journal of Cryptologic Research (2095-7025), 2023, v. 10, n. 3, p. 622, doi. 10.13868/j.cnki.jcr.000618
- By:
- Publication type:
- Article
Improved Rectangle and Boomerang Attacks on MIBS-64.
- Published in:
- Journal of Cryptologic Research (2095-7025), 2023, v. 10, n. 3, p. 634, doi. 10.13868/j.cnki.jcr.000620
- By:
- Publication type:
- Article
Algorithms for Solving the Unbalanced r-Collision Problem.
- Published in:
- Journal of Cryptologic Research (2095-7025), 2023, v. 10, n. 3, p. 574, doi. 10.13868/j.cnki.jcr.000614
- By:
- Publication type:
- Article
Integral Cryptanalysis of Lightweight Block Cipher PFP and SLIM.
- Published in:
- Journal of Cryptologic Research (2095-7025), 2023, v. 10, n. 3, p. 609, doi. 10.13868/j.cnki.jcr.000617
- By:
- Publication type:
- Article
An Enumeration Problem of Periodic Binary Sequences with Same Linear Complexity and Nonlinear Complexity.
- Published in:
- Journal of Cryptologic Research (2095-7025), 2023, v. 10, n. 3, p. 517, doi. 10.13868/j.cnki.jcr.000610
- By:
- Publication type:
- Article
Optimized Realization of AES-Like Algorithm S-Box.
- Published in:
- Journal of Cryptologic Research (2095-7025), 2023, v. 10, n. 3, p. 531, doi. 10.13868/j.cnki.jcr.000611
- By:
- Publication type:
- Article
Two Optimization Methods of SubSieve Algorithm.
- Published in:
- Journal of Cryptologic Research (2095-7025), 2023, v. 10, n. 3, p. 476, doi. 10.13868/j.cnki.jcr.000606
- By:
- Publication type:
- Article
Post-Quantum Cryptography--Having It Implemented Right.
- Published in:
- Journal of Cryptologic Research (2095-7025), 2023, v. 10, n. 3, p. 659, doi. 10.13868/j.cnki.jcr.000624
- By:
- Publication type:
- Article
Quantum Obfuscation Based on Quantum Nonlinear Function.
- Published in:
- Journal of Cryptologic Research (2095-7025), 2023, v. 10, n. 3, p. 506, doi. 10.13868/j.cnki.jcr.000608
- By:
- Publication type:
- Article
A Number-Theoretic Transform Algorithm on A New Polynomial Ring.
- Published in:
- Journal of Cryptologic Research (2095-7025), 2023, v. 10, n. 3, p. 539, doi. 10.13868/j.cnki.jcr.000612
- By:
- Publication type:
- Article
Secure Federated Learning Based on Secret Sharing and Aggregate Signature.
- Published in:
- Journal of Cryptologic Research (2095-7025), 2023, v. 10, n. 3, p. 588, doi. 10.13868/j.cnki.jcr.000615
- By:
- Publication type:
- Article
A Survey of Microarchitectural Covert-Channel Attacks, Defenses and Detection.
- Published in:
- Journal of Cryptologic Research (2095-7025), 2023, v. 10, n. 3, p. 447, doi. 10.13868/j.cnki.jcr.000609
- By:
- Publication type:
- Article
Sealed Bidding Auction with No Trusted Auctioneer on Blockchain.
- Published in:
- Journal of Cryptologic Research (2095-7025), 2023, v. 10, n. 3, p. 491, doi. 10.13868/j.cnki.jcr.000607
- By:
- Publication type:
- Article
Several Classes of Power Functions and Permutation Polynomials with Low c-Differential Uniformity.
- Published in:
- Journal of Cryptologic Research (2095-7025), 2023, v. 10, n. 3, p. 597, doi. 10.13868/j.cnki.jcr.000616
- By:
- Publication type:
- Article
Security Analysis of AES, 3D and TANGRAM Block Ciphers Based on Yoyo Tricks.
- Published in:
- Journal of Cryptologic Research (2095-7025), 2023, v. 10, n. 3, p. 554, doi. 10.13868/j.cnki.jcr.000613
- By:
- Publication type:
- Article