Results 201 to 210 of about 23,331 (249)
Resilient and verifiable outsourced attribute-based non-interactive oblivious transfer protocol for tactical edge networks. [PDF]
Liu W, Fu B, Wang L.
europepmc +1 more source
Quantum secure image encryption using hybrid QTRNG and QPRNG. [PDF]
Gururaja TS, Pravinkumar P.
europepmc +1 more source
ChebIoD: a Chebyshev polynomial-based lightweight authentication scheme for internet of drones environments. [PDF]
Al-Mekhlafi ZG +9 more
europepmc +1 more source
Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction. [PDF]
Ibrahim MM +6 more
europepmc +1 more source
Deep learning-based profiling side-channel attacks in SPECK cipher. [PDF]
Hameed F, Alkhzaimi H.
europepmc +1 more source
Semi-automatic verification of cryptographic primitives
Sylvain Heraud +2 more
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A language-dependent cryptographic primitive
Journal of Cryptology, 1997zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hiroki Shizuya
exaly +3 more sources
Controlled Operations as a Cryptographic Primitive
Lecture Notes in Computer Science, 2001Controlled two-place operations (CTPO) are introduced as a new cryptographic primitive for the block ciphers. Design criteria, structure, some good cryptographic properties of the CTPO are considered. There are proposed CTPO representing single nonlinear operations on the operands of relatively large length.
Boris V. Izotov +2 more
exaly +2 more sources

