Works matching IS 2410387X AND DT 2023 AND VI 7 AND IP 2
Results: 17
Research on PoW Protocol Security under Optimized Long Delay Attack.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 2, p. 32, doi. 10.3390/cryptography7020032
- By:
- Publication type:
- Article
Inferring Bivariate Polynomials for Homomorphic Encryption Application.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 2, p. 31, doi. 10.3390/cryptography7020031
- By:
- Publication type:
- Article
Secure Firmware Update: Challenges and Solutions.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 2, p. 30, doi. 10.3390/cryptography7020030
- By:
- Publication type:
- Article
Timing-Attack-Resistant Acceleration of NTRU Round 3 Encryption on Resource-Constrained Embedded Systems.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 2, p. 29, doi. 10.3390/cryptography7020029
- By:
- Publication type:
- Article
Flexible and Efficient Multi-Keyword Ranked Searchable Attribute-Based Encryption Schemes.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 2, p. 28, doi. 10.3390/cryptography7020028
- By:
- Publication type:
- Article
Blockchain-Based Electronic Voting: A Secure and Transparent Solution.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 2, p. 27, doi. 10.3390/cryptography7020027
- By:
- Publication type:
- Article
Revisiting Multiple Ring Oscillator-Based True Random Generators to Achieve Compact Implementations on FPGAs for Cryptographic Applications.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 2, p. 26, doi. 10.3390/cryptography7020026
- By:
- Publication type:
- Article
PudgyTurtle Mode Resists Bit-Flipping Attacks.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 2, p. 25, doi. 10.3390/cryptography7020025
- By:
- Publication type:
- Article
LACT+: Practical Post-Quantum Scalable Confidential Transactions.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 2, p. 24, doi. 10.3390/cryptography7020024
- By:
- Publication type:
- Article
Neural Crypto-Coding Based Approach to Enhance the Security of Images over the Untrusted Cloud Environment.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 2, p. 23, doi. 10.3390/cryptography7020023
- By:
- Publication type:
- Article
Anonymous Homomorphic IBE with Application to Anonymous Aggregation.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 2, p. 22, doi. 10.3390/cryptography7020022
- By:
- Publication type:
- Article
A Multi-Party Functional Signatures Scheme for Private Blockchain.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 2, p. 21, doi. 10.3390/cryptography7020021
- By:
- Publication type:
- Article
Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 2, p. 20, doi. 10.3390/cryptography7020020
- By:
- Publication type:
- Article
Algebraic Cryptanalysis with MRHS Equations.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 2, p. 19, doi. 10.3390/cryptography7020019
- By:
- Publication type:
- Article
A Novel FPGA Implementation of the NAND-PUF with Minimal Resource Usage and High Reliability.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 2, p. 18, doi. 10.3390/cryptography7020018
- By:
- Publication type:
- Article
SCANN: Side Channel Analysis of Spiking Neural Networks.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 2, p. 17, doi. 10.3390/cryptography7020017
- By:
- Publication type:
- Article
Encryption Scheme of Verifiable Search Based on Blockchain in Cloud Environment.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 2, p. 16, doi. 10.3390/cryptography7020016
- By:
- Publication type:
- Article