Search

Showing total 264 results

Search Constraints

Start Over You searched for: Topic cryptography Remove constraint Topic: cryptography Language english Remove constraint Language: english Journal ieee access Remove constraint Journal: ieee access
264 results

Search Results

1. Module Lattice-Based Post Quantum Secure Blockchain Empowered Authentication Framework for Autonomous Truck Platooning

2. Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-Based Cryptography, and Chaotic Cryptography Techniques

3. A Survey on Key Agreement and Authentication Protocol for Internet of Things Application

4. A Comprehensive Analysis of Blockchain Technology and Consensus Protocols Across Multilayered Framework

5. A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review

6. A Survey on DNA-Based Cryptography and Steganography

7. Arbiter PUF—A Review of Design, Composition, and Security Aspects

8. Post-Quantum Era Privacy Protection for Intelligent Infrastructures

9. Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities

10. Towards a Novel Generalized Chinese Remainder Algorithm for Extended Rabin Cryptosystem

11. Meet the Sherlock Holmes’ of Side Channel Leakage: A Survey of Cache SCA Detection Techniques

12. Anonymous Quantum Safe Construction of Three Party Authentication and Key Agreement Protocol for Mobile Devices

13. An Efficient Hardware/Software Co-Design for FALCON on Low-End Embedded Systems

14. Multiple Layer Public Blockchain Approach for Internet of Things (IoT) Systems

15. Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing

16. Enhancing Copyright Protection Through Blockchain and Ring Signature Algorithm From Lattice

17. A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies

18. A Comprehensive Review on Cyber-Attacks in Power Systems: Impact Analysis, Detection, and Cyber Security

19. Enhancing LoRaWAN Security: An Advanced AES-Based Cryptographic Approach

20. Automated Chaos-Driven S-Box Generation and Analysis Tool for Enhanced Cryptographic Resilience

21. SoK of Used Cryptography in Blockchain

22. A Selective Image Encryption Scheme Based on 2D DWT, Henon Map and 4D Qi Hyper-Chaos

23. Visual Surveillance Within the EU General Data Protection Regulation: A Technology Perspective

24. Lightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques

25. Elliptic Curve Lightweight Cryptography: A Survey

26. Faster Bootstrapping With Multiple Addends

27. VLSI Implementation of a Cost-Efficient Micro Control Unit With an Asymmetric Encryption for Wireless Body Sensor Networks

28. A Construction of Three Party Post Quantum Secure Authenticated Key Exchange Using Ring Learning With Errors and ECC Cryptography

29. A Secure Chaos-Based Lightweight Cryptosystem for the Internet of Things

30. Security Analysis of Hybrid Attack for NTRU-Class Encryption Schemes

31. Secured Authentication of RFID Devices Using Lightweight Block Ciphers on FPGA Platforms

32. EGCrypto: A Low-Complexity Elliptic Galois Cryptography Model for Secure Data Transmission in IoT

33. Insider Attack Model Against HSM-Based Architecture

34. From Diffusion to Confusion of RGB Pixels Using a New Chaotic System for Color Image Encryption

35. Systematic Mapping Study of Security in Multi-Embedded-Agent Systems

36. Nature-Inspired Gravitational Search-Guided Artificial Neural Key Exchange for IoT Security Enhancement

37. Bijective S-Boxes Method Using Improved Chaotic Map-Based Heuristic Search and Algebraic Group Structures

38. IoT-HarPSecA: A Framework and Roadmap for Secure Design and Development of Devices and Applications in the IoT Space

39. Recent Advances in Smart Contracts: A Technical Overview and State of the Art

40. Reduction From Module-SIS to Ring-SIS Under Norm Constraint of Ring-SIS

41. CASDC: A Cryptographically Secure Data System Based on Two Private Key Images

42. Learning Multi-Party Adversarial Encryption and Its Application to Secret Sharing

43. Rotation Left Digits to Enhance the Security Level of Message Blocks Cryptography

44. How Practical Are Fault Injection Attacks, Really?

45. Trajectory-Based Authenticated Key Establishment for Dynamic Internet of Things

46. A Robust Chaos-Based Technique for Medical Image Encryption

47. Current Balancing Random Body Bias in FDSOI Cryptosystems as a Countermeasure to Leakage Power Analysis Attacks

48. TensorCrypto: High Throughput Acceleration of Lattice-Based Cryptography Using Tensor Core on GPU

49. Visual Surveillance Within the EU General Data Protection Regulation: A Technology Perspective

50. Smartphones Identification Through the Built-In Microphones With Convolutional Neural Network