Works matching Public key cryptography
1
- Wireless Personal Communications, 2015, v. 81, n. 2, p. 779, doi. 10.1007/s11277-014-2157-5
- Article
2
- Information Security Journal: A Global Perspective, 2010, v. 19, n. 5, p. 243, doi. 10.1080/19393555.2010.499799
- Tawalbeh, Lo'aiA.;
- Sweidan, Saadeh
- Article
3
- Computer Journal, 2017, v. 60, n. 8, p. 1197, doi. 10.1093/comjnl/bxx010
- Article
4
- Cryptography (2410-387X), 2023, v. 7, n. 4, p. 49, doi. 10.3390/cryptography7040049
- Soroceanu, Tudor;
- Buchmann, Nicolas;
- Margraf, Marian
- Article
5
- Security & Communication Networks, 2014, v. 7, n. 4, p. 774, doi. 10.1002/sec.779
- Seo, Hwajeong;
- Lee, Yeoncheol;
- Kim, Hyunjin;
- Park, Taehwan;
- Kim, Howon
- Article
6
- Sādhanā: Academy Proceedings in Engineering Sciences, 2020, v. 45, n. 1, p. N.PAG, doi. 10.1007/s12046-020-01447-6
- Kundu, Nibedita;
- Debnath, Sumit Kumar;
- Mishra, Dheerendra
- Article
7
- Journal of the Korea Institute of Information & Communication Engineering, 2023, v. 27, n. 6, p. 752, doi. 10.6109/jkiice.2023.27.6.752
- Article
8
- Revista Vínculos, 2024, v. 21, n. 1, p. 1
- Article
9
- Mathematics (2227-7390), 2020, v. 8, n. 5, p. 734, doi. 10.3390/math8050734
- Durán Díaz, Raúl;
- Hernández Encinas, Luis;
- Muñoz Masqué, Jaime
- Article
10
- Journal of Mathematical Modeling (JMM), 2023, v. 11, n. 4, p. 681, doi. 10.22124/JMM.2023.23982.2142
- Naseri, Azadeh Ramezanpour;
- Abbasi, Ahmad;
- Atani, Reza Ebrahimi
- Article
11
- International Journal of Information Security, 2022, v. 21, n. 1, p. 103, doi. 10.1007/s10207-021-00543-w
- Article
12
- Journal of Navigation, 2022, v. 75, n. 2, p. 333, doi. 10.1017/S0373463321000837
- Wimpenny, Gareth;
- Šafář, Jan;
- Grant, Alan;
- Bransby, Martin
- Article
13
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 2, p. 210, doi. 10.1049/ise2.12092
- Ikematsu, Yasuhiko;
- Nakamura, Shuhei;
- Takagi, Tsuyoshi
- Article
14
- Integers: Electronic Journal of Combinatorial Number Theory, 2023, v. 23, p. 1, doi. 10.5281/zenodo.8349074
- Article
15
- Journal of Cryptology, 2018, v. 31, n. 4, p. 1164, doi. 10.1007/s00145-018-9298-8
- Hutter, Michael;
- Wenger, Erich
- Article
16
- Journal of Algorithms & Computational Technology, 2024, v. 18, p. 1, doi. 10.1177/17483026241252407
- Haidary Makoui, Farshid;
- Gulliver, Thomas Aaron
- Article
17
- Applied Sciences (2076-3417), 2022, v. 12, n. 15, p. 7401, doi. 10.3390/app12157401
- Huang, Huawei;
- Li, Chunhua;
- Deng, Lunzhi
- Article
18
- Math Horizons, 2021, v. 28, n. 2, p. 18, doi. 10.1080/10724117.2020.1814050
- Article
19
- International Journal of Theoretical Physics, 2022, v. 61, n. 8, p. 1, doi. 10.1007/s10773-022-05195-7
- Chen, Hui-Min;
- Jia, Heng-Yue;
- Wu, Xia;
- Wang, Xiu-Li
- Article
20
- Discrete Mathematics, Algorithms & Applications, 2018, v. 10, n. 6, p. N.PAG, doi. 10.1142/S1793830918500817
- Goswami, Pinkimani;
- Singh, Madan Mohan
- Article
21
- Technium, 2023, v. 6, p. 21, doi. 10.47577/technium.v5i.8238
- Article
22
- Technium, 2023, v. 5, p. 21, doi. 10.47577/technium.v5i.8238
- Article
23
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1791, doi. 10.15866/irecos.v9i10.3781
- Raj Vincent, P. M. Durai;
- Sathiyamoorthy, E.
- Article
24
- Journal of Information Science & Engineering, 2008, v. 24, n. 4, p. 1213
- Article
25
- Multimedia Tools & Applications, 2021, v. 80, n. 21-23, p. 32023, doi. 10.1007/s11042-021-11202-6
- Karolin, M.;
- Meyyappan, T.
- Article
26
- Wireless Personal Communications, 2014, v. 79, n. 1, p. 661, doi. 10.1007/s11277-014-1879-8
- Memon, Imran;
- Mohammed, Mohammed;
- Akhtar, Rizwan;
- Memon, Hina;
- Memon, Muhammad;
- Shaikh, Riaz
- Article
27
- Journal of Jilin University (Science Edition) / Jilin Daxue Xuebao (Lixue Ban), 2017, v. 55, n. 6, p. 1557, doi. 10.13413/j.cnki.jdxblxb.2017.06.38
- Article
28
- Wireless Personal Communications, 2015, v. 85, n. 3, p. 879, doi. 10.1007/s11277-015-2815-2
- Islam, SK;
- Singh, Abhishek
- Article
29
- Wireless Personal Communications, 2015, v. 82, n. 2, p. 1027, doi. 10.1007/s11277-014-2264-3
- Kumar, Abhimanyu;
- Tripathi, Sachin
- Article
30
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 912, doi. 10.3969/j.issn.1001-3695.2015.03.063
- Article
31
- Security & Communication Networks, 2015, v. 8, n. 13, p. 2214, doi. 10.1002/sec.1165
- Islam, SK Hafizul;
- Khan, Muhammad Khurram;
- Al-Khouri, Ali M.
- Article
32
- Journal on Communication / Tongxin Xuebao, 2022, v. 43, n. 7, p. 62, doi. 10.11959/j.issn.1000−436x.2022130
- Article
33
- JSIAM Letters (Online), 2023, v. 15, p. 109, doi. 10.14495/jsiaml.15.109
- Article
34
- Symmetry (20738994), 2018, v. 10, n. 1, p. 23, doi. 10.3390/sym10010023
- Tai, Wei-Liang;
- Chang, Ya-Fen
- Article
35
- International Journal of Circuit Theory & Applications, 2017, v. 45, n. 2, p. 145, doi. 10.1002/cta.2296
- Acosta, Antonio J.;
- Addabbo, Tommaso;
- Tena‐Sánchez, Erica
- Article
36
- International Journal for Computers & Their Applications, 2023, v. 30, n. 2, p. 140
- Neupane, Anjila;
- Mitra, Reshmi;
- Roy, Indranil;
- Gupta, Bidyut;
- Debnath, Narayan
- Article
37
- KSII Transactions on Internet & Information Systems, 2021, v. 15, n. 7, p. 2610, doi. 10.3837/tiis.2021.07.017
- Article
38
- Information Security Journal: A Global Perspective, 2023, v. 32, n. 1, p. 21, doi. 10.1080/19393555.2022.2047839
- Nait Hamoud, Othmane;
- Kenaza, Tayeb;
- Challal, Yacine;
- Ben-Abdelatif, Lina;
- Ouaked, Maroua
- Article
39
- Information Security Journal: A Global Perspective, 2022, v. 31, n. 5, p. 566, doi. 10.1080/19393555.2021.1919795
- Article
40
- International Journal of Information Security, 2022, v. 21, n. 4, p. 937, doi. 10.1007/s10207-022-00587-6
- Tan, Teik Guan;
- Szalachowski, Pawel;
- Zhou, Jianying
- Article
41
- International Journal of Information Security, 2019, v. 18, n. 5, p. 619, doi. 10.1007/s10207-019-00430-5
- Rastegari, Parvin;
- Susilo, Willy;
- Dakhilalian, Mohammad
- Article
42
- Journal of Information Assurance & Security, 2015, v. 10, n. 1, p. 1
- Gayoso Martínez, V.;
- Hernández Encinas, L.
- Article
43
- Quantum Information Processing, 2022, v. 21, n. 6, p. 1, doi. 10.1007/s11128-022-03541-6
- Wang, Yuqi;
- Chen, Geng;
- Jian, Liya;
- Zhou, Yi;
- Liu, Shiming
- Article
44
- Journal of Information & Communication Convergence Engineering, 2017, v. 15, n. 3, p. 160, doi. 10.6109/jicce.2017.15.3.160
- Article
45
- Journal of the Korea Institute of Information & Communication Engineering, 2018, v. 22, n. 1, p. 100, doi. 10.6109/jkiice.2018.22.1.100
- Article
46
- Journal of the Korea Institute of Information & Communication Engineering, 2017, v. 21, n. 8, p. 1471, doi. 10.6109/jkiice.2017.21.8.1471
- Article
47
- International Journal of Electrical & Computer Engineering (2088-8708), 2020, v. 10, n. 2, p. 1430, doi. 10.11591/ijece.v10i2.pp1430-1437
- Tahat, Nedal;
- Tahat, Ashraf A.;
- Abu-Dalu, Maysam;
- Albadarneh, Ramzi B.;
- Abdallah, Alaa E.;
- Al-Hazaimeh, Obaida M.
- Article
48
- Journal of Optics (09728821), 2023, v. 52, n. 2, p. 527, doi. 10.1007/s12596-022-01011-x
- Wang, Miao;
- Yang, Xiulun;
- Meng, Xiangfeng;
- Wang, Yurong;
- Yin, Yongkai;
- Dong, Guoyan
- Article
49
- Journal of Advanced Technology & Management, 2024, v. 13, n. 1, p. 21, doi. 10.6193/JATM.202411_13(1).0002
- Article
50
- Scientific Research & Education in the Air Force - AFASES, 2014, v. 1, p. 367
- PURA, Mihai Lica;
- PATRICIU, Victor Valeriu
- Article