Search

Showing total 4,555 results
4,555 results

Search Results

1. Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis.

2. A review paper: Text-to-image cryptography in color coding.

3. A multi-party verifiable quantum proxy signature scheme based on quantum teleportation.

4. Secret Paper with Vinegar as an Invisible Security Ink and Fire as a Decryption Key for Information Protection.

5. Pseudo-random number generation based on spatial chaotic map of Logistic type and its cryptographic application.

6. Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography.

7. Survey of research on confidential computing.

8. Multi-stage cryptography technique for wireless networks.

9. Comparative analysis between a pixel-wise image encryption scheme and AES in a web application context.

10. Parallel Search Using Probabilistic DNA Sticker Model to Cryptanyze One Time Pad Polyalphabetic Cipher.

11. A comprehensive survey for cryptography implementation using quantum computing.

12. A blockchain-based secure system for cloud storage.

13. Quantum implementation of SHA1 and MD5 and comparison with classical algorithms.

14. Mixture Differential Cryptanalysis on Round-Reduced SIMON32/64 Using Machine Learning.

15. Concrete quantum cryptanalysis of binary elliptic curves via addition chain.

16. DieRoll: A Unique Key Generation and Encryption Technique.

17. Possibility of land ownership transaction with non-fungible token technology: Minting survey plan.

18. E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval.

19. Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks.

20. A review of steganography techniques.

21. Study: Cryptography for information security.

22. History, decoded.

23. Reconfigurable Image Confusion Scheme Using Large Period Pseudorandom Bit Generator Based on Coupled-Variable Input LCG and Clock Divider.

24. Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions.

25. BLE-based secure tracking system proposal.

26. An efficient privacy-preserving recommender system in wireless networks.

27. Secured and decentralized system for e-voting with hybrid cryptography and Blockchain.

28. Design of a Low-Power Cryptographic Accelerator Under Advanced Encryption Standard.

29. Quantum related-key differential cryptanalysis.

30. Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication.

31. High Embedding Capacity Color Image Steganography Scheme Using Pixel Value Differencing and Addressing the Falling-Off Boundary Problem.

32. A Secure Protocol Authentication Method Based on the Strand Space Model for Blockchain-Based Industrial Internet of Things.

33. Comprehensive Neural Cryptanalysis on Block Ciphers Using Different Encryption Methods.

34. Secure, light‐weight and dynamic PUF‐based mutual device authentication mechanism in industrial IoT networks.

35. Link-based penalized trust management scheme for preemptive measures to secure the edge-based internet of things networks.

36. An edge computing oriented unified cryptographic key management service for financial context.

37. Identification of ECA rules forming MACA in periodic boundary condition.

38. Expanded low-rank parity-check codes and their application to cryptography.

39. Minimal codewords: An application of relative four-weight codes.

40. Some Special Perfect c-Nonlinear Functions on ℤn.

41. On a class of permutation trinomials over finite fields.

42. Methods of linear and differential relations in cryptography.

43. Breaking permutation-based pseudorandom cryptographic schemes using distributed exact quantum algorithms.

44. The Security Evaluation of an Efficient Lightweight AES Accelerator †.

45. Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance.

46. Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography.

47. Analysis of Biometric-Based Cryptographic Key Exchange Protocols—BAKE and BRAKE.

48. An Engineered Minimal-Set Stimulus for Periodic Information Leakage Fault Detection on a RISC-V Microprocessor.

49. SPANSE: Combining sparsity with density for efficient one-time code-based digital signatures.

50. Continuous identity authentication protocol against quantum attacks in satellite integrated smart grid.