Works matching IS 2410387X AND DT 2022 AND VI 6 AND IP 2
Results: 17
ChaCha20-Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 2, p. 1, doi. 10.3390/cryptography6020030
- By:
- Publication type:
- Article
Probabilistic Logic Models for the Lightning Network.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 2, p. 1, doi. 10.3390/cryptography6020029
- By:
- Publication type:
- Article
A New Chaotic-Based RGB Image Encryption Technique Using a Nonlinear Rotational 16 × 16 DNA Playfair Matrix.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 2, p. 1, doi. 10.3390/cryptography6020028
- By:
- Publication type:
- Article
Review of Chosen Isogeny-Based Cryptographic Schemes.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 2, p. 1, doi. 10.3390/cryptography6020027
- By:
- Publication type:
- Article
Locating Side Channel Leakage in Time through Matched Filters.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 2, p. 1, doi. 10.3390/cryptography6020026
- By:
- Publication type:
- Article
Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 2, p. 1, doi. 10.3390/cryptography6020025
- By:
- Publication type:
- Article
Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 2, p. 1, doi. 10.3390/cryptography6020024
- By:
- Publication type:
- Article
Localized State-Change Consensus in Immense and Highly Dynamic Environments.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 2, p. 1, doi. 10.3390/cryptography6020023
- By:
- Publication type:
- Article
A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 2, p. 1, doi. 10.3390/cryptography6020022
- By:
- Publication type:
- Article
Computational Analysis of Interleaving PN-Sequences with Different Polynomials.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 2, p. 1, doi. 10.3390/cryptography6020021
- By:
- Publication type:
- Article
Certificate Management Scheme for VANETs Using Blockchain Structure.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 2, p. 1, doi. 10.3390/cryptography6020020
- By:
- Publication type:
- Article
A Memory Hierarchy Protected against Side-Channel Attacks.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 2, p. 1, doi. 10.3390/cryptography6020019
- By:
- Publication type:
- Article
A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 2, p. 1, doi. 10.3390/cryptography6020018
- By:
- Publication type:
- Article
Privacy Issues in Stylometric Methods.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 2, p. 1, doi. 10.3390/cryptography6020017
- By:
- Publication type:
- Article
Benchmark Analysis of YOLO Performance on Edge Intelligence Devices.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 2, p. 1, doi. 10.3390/cryptography6020016
- By:
- Publication type:
- Article
Tightly Secure PKE Combiner in the Quantum Random Oracle Model.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 2, p. 1, doi. 10.3390/cryptography6020015
- By:
- Publication type:
- Article
Continuous Nonintrusive Mobile Device Soft Keyboard Biometric Authentication.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 2, p. 1, doi. 10.3390/cryptography6020014
- By:
- Publication type:
- Article