Works matching IS 2410387X AND DT 2023 AND VI 7 AND IP 3
Results: 13
A New Idea for RSA Backdoors.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 3, p. 45, doi. 10.3390/cryptography7030045
- By:
- Publication type:
- Article
A Novel and Secure Fake-Modulus Based Rabin-Ӡ Cryptosystem.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 3, p. 44, doi. 10.3390/cryptography7030044
- By:
- Publication type:
- Article
Divisions and Square Roots with Tight Error Analysis from Newton–Raphson Iteration in Secure Fixed-Point Arithmetic.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 3, p. 43, doi. 10.3390/cryptography7030043
- By:
- Publication type:
- Article
Enhanced Authentication for Decentralized IoT Access Control Architecture.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 3, p. 42, doi. 10.3390/cryptography7030042
- By:
- Publication type:
- Article
Matrix Encryption Walks for Lightweight Cryptography.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 3, p. 41, doi. 10.3390/cryptography7030041
- By:
- Publication type:
- Article
A Survey of Post-Quantum Cryptography: Start of a New Race.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 3, p. 40, doi. 10.3390/cryptography7030040
- By:
- Publication type:
- Article
Applications of Neural Network-Based AI in Cryptography.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 3, p. 39, doi. 10.3390/cryptography7030039
- By:
- Publication type:
- Article
Boosting Quantum Key Distribution via the End-to-End Loss Control.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 3, p. 38, doi. 10.3390/cryptography7030038
- By:
- Publication type:
- Article
A New RSA Variant Based on Elliptic Curves.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 3, p. 37, doi. 10.3390/cryptography7030037
- By:
- Publication type:
- Article
The Role of Blockchain in Medical Data Sharing.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 3, p. 36, doi. 10.3390/cryptography7030036
- By:
- Publication type:
- Article
Automated Classical Cipher Emulation Attacks via Unified Unsupervised Generative Adversarial Networks.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 3, p. 35, doi. 10.3390/cryptography7030035
- By:
- Publication type:
- Article
Detecting Smart Contract Vulnerabilities with Combined Binary and Multiclass Classification.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 3, p. 34, doi. 10.3390/cryptography7030034
- By:
- Publication type:
- Article
Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 3, p. 33, doi. 10.3390/cryptography7030033
- By:
- Publication type:
- Article