Results 261 to 270 of about 375,459 (282)
Some of the next articles are maybe not open access.

From Biometric Data to Cryptographic Primitives: A New Method for Generation of Substitution Boxes

International Conference on Biomedical Engineering and Biotechnology, 2017
F. Özkaynak
semanticscholar   +1 more source

Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation

The Cryptographer's Track at RSA Conference, 2014
Markku-Juhani O. Saarinen
semanticscholar   +1 more source

Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures

Proceedings of the IEEE, 2012
Alessandro Barenghi, Hideki Taguchi
exaly  

Improve the Onion Routing Performance and Security with Cryptographic Algorithms

International Journal on Recent and Innovation Trends in Computing and Communication, 2023
exaly  

Foundations of garbled circuits

Conference on Computer and Communications Security, 2012
M. Bellare, Viet Tung Hoang, P. Rogaway
semanticscholar   +1 more source

Physical unclonable functions based on crossbar arrays for cryptographic applications

International journal of circuit theory and applications, 2013
P. Lugli   +5 more
semanticscholar   +1 more source

Strong Authentication for RFID Systems Using the AES Algorithm

Workshop on Cryptographic Hardware and Embedded Systems, 2004
Martin Feldhofer   +2 more
semanticscholar   +1 more source

A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments

Journal of Network and Computer Applications, 2015
Jia Hao Kong, Li-minn Ang
exaly  

Home - About - Disclaimer - Privacy