Works matching IS 2410387X AND DT 2023 AND VI 7 AND IP 4
Results: 18
One-to-Many Simultaneous Secure Quantum Information Transmission.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 64, doi. 10.3390/cryptography7040064
- By:
- Publication type:
- Article
Practical Certificate-Less Infrastructure with Application in TLS.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 63, doi. 10.3390/cryptography7040063
- By:
- Publication type:
- Article
A Publicly Verifiable E-Voting System Based on Biometrics.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 62, doi. 10.3390/cryptography7040062
- By:
- Publication type:
- Article
Garbled Circuits Reimagined: Logic Synthesis Unleashes Efficient Secure Computation.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 61, doi. 10.3390/cryptography7040061
- By:
- Publication type:
- Article
Comparative Study of Keccak SHA-3 Implementations.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 60, doi. 10.3390/cryptography7040060
- By:
- Publication type:
- Article
Privacy-Preserving k-Nearest Neighbor Classification over Malicious Participants in Outsourced Cloud Environments.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 59, doi. 10.3390/cryptography7040059
- By:
- Publication type:
- Article
Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 58, doi. 10.3390/cryptography7040058
- By:
- Publication type:
- Article
Secure Groups for Threshold Cryptography and Number-Theoretic Multiparty Computation †.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 56, doi. 10.3390/cryptography7040056
- By:
- Publication type:
- Article
FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 55, doi. 10.3390/cryptography7040055
- By:
- Publication type:
- Article
Random Number Generators: Principles and Applications.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 54, doi. 10.3390/cryptography7040054
- By:
- Publication type:
- Article
On the Security of Quantum Key Distribution Networks.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 53, doi. 10.3390/cryptography7040053
- By:
- Publication type:
- Article
SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation †.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 52, doi. 10.3390/cryptography7040052
- By:
- Publication type:
- Article
Privacy-Preserving Techniques in Cloud/Fog and Internet of Things.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 51, doi. 10.3390/cryptography7040051
- By:
- Publication type:
- Article
XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era †.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 50, doi. 10.3390/cryptography7040050
- By:
- Publication type:
- Article
On Multiple Encryption for Public-Key Cryptography.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 49, doi. 10.3390/cryptography7040049
- By:
- Publication type:
- Article
A Practical Implementation of Medical Privacy-Preserving Federated Learning Using Multi-Key Homomorphic Encryption and Flower Framework.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 48, doi. 10.3390/cryptography7040048
- By:
- Publication type:
- Article
Hiding Full-Color Images into Audio with Visual Enhancement via Residual Networks.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 47, doi. 10.3390/cryptography7040047
- By:
- Publication type:
- Article
A High-Efficiency Modular Multiplication Digital Signal Processing for Lattice-Based Post-Quantum Cryptography.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 46, doi. 10.3390/cryptography7040046
- By:
- Publication type:
- Article