Works matching IS 2410387X AND DT 2024 AND VI 8 AND IP 1
Results: 11
Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 1, p. 11, doi. 10.3390/cryptography8010011
- By:
- Publication type:
- Article
E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 1, p. 10, doi. 10.3390/cryptography8010010
- By:
- Publication type:
- Article
NLU-V: A Family of Instruction Set Extensions for Efficient Symmetric Cryptography on RISC-V.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 1, p. 9, doi. 10.3390/cryptography8010009
- By:
- Publication type:
- Article
FPGA-Based Acceleration of K-Nearest Neighbor Algorithm on Fully Homomorphic Encrypted Data.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 1, p. 8, doi. 10.3390/cryptography8010008
- By:
- Publication type:
- Article
Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 1, p. 7, doi. 10.3390/cryptography8010007
- By:
- Publication type:
- Article
Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 1, p. 6, doi. 10.3390/cryptography8010006
- By:
- Publication type:
- Article
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 1, p. 5, doi. 10.3390/cryptography8010005
- By:
- Publication type:
- Article
Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 1, p. 4, doi. 10.3390/cryptography8010004
- By:
- Publication type:
- Article
Novel and Efficient Privacy-Preserving Continuous Authentication.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 1, p. 3, doi. 10.3390/cryptography8010003
- By:
- Publication type:
- Article
Locking-Enabled Security Analysis of Cryptographic Circuits †.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 1, p. 2, doi. 10.3390/cryptography8010002
- By:
- Publication type:
- Article
Residue Number System (RNS) and Power Distribution Network Topology-Based Mitigation of Power Side-Channel Attacks.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 1, p. 1, doi. 10.3390/cryptography8010001
- By:
- Publication type:
- Article