Works matching IS 2410387X AND DT 2024 AND VI 8 AND IP 3
Results: 17
CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 3, p. 43, doi. 10.3390/cryptography8030043
- By:
- Publication type:
- Article
A Multi-Candidate Self-Tallying Voting Scheme Based on Smart Contracts.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 3, p. 42, doi. 10.3390/cryptography8030042
- By:
- Publication type:
- Article
Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 3, p. 41, doi. 10.3390/cryptography8030041
- By:
- Publication type:
- Article
Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 3, p. 40, doi. 10.3390/cryptography8030040
- By:
- Publication type:
- Article
A Novel Method of Secured Data Distribution Using Sharding Zkp and Zero Trust Architecture in Blockchain Multi Cloud Environment.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 3, p. 39, doi. 10.3390/cryptography8030039
- By:
- Publication type:
- Article
Efficient Commutative PQC Algorithms on Isogenies of Edwards Curves.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 3, p. 38, doi. 10.3390/cryptography8030038
- By:
- Publication type:
- Article
RETRACTED: Liu et al. A Publicly Verifiable E-Voting System Based on Biometrics. Cryptography 2023, 7 , 62.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 3, p. 37, doi. 10.3390/cryptography8030037
- By:
- Publication type:
- Article
Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 3, p. 36, doi. 10.3390/cryptography8030036
- By:
- Publication type:
- Article
A Note on the Quasigroup of Lai–Massey Structures.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 3, p. 35, doi. 10.3390/cryptography8030035
- By:
- Publication type:
- Article
A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 3, p. 34, doi. 10.3390/cryptography8030034
- By:
- Publication type:
- Article
Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 3, p. 33, doi. 10.3390/cryptography8030033
- By:
- Publication type:
- Article
Entropy Analysis of FPGA Interconnect and Switch Matrices for Physical Unclonable Functions.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 3, p. 32, doi. 10.3390/cryptography8030032
- By:
- Publication type:
- Article
Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 3, p. 31, doi. 10.3390/cryptography8030031
- By:
- Publication type:
- Article
Improve Parallel Resistance of Hashcash Tree.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 3, p. 30, doi. 10.3390/cryptography8030030
- By:
- Publication type:
- Article
Public Key Protocols from Twisted-Skew Group Rings.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 3, p. 29, doi. 10.3390/cryptography8030029
- By:
- Publication type:
- Article
Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 3, p. 28, doi. 10.3390/cryptography8030028
- By:
- Publication type:
- Article
The Emerging Challenges of Wearable Biometric Cryptosystems.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 3, p. 27, doi. 10.3390/cryptography8030027
- By:
- Publication type:
- Article