Results 261 to 266 of about 380,993 (266)
Some of the next articles are maybe not open access.
Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation
The Cryptographer's Track at RSA Conference, 2014Markku-Juhani O. Saarinen
semanticscholar +1 more source
Foundations of garbled circuits
Conference on Computer and Communications Security, 2012M. Bellare, Viet Tung Hoang, P. Rogaway
semanticscholar +1 more source
Physical unclonable functions based on crossbar arrays for cryptographic applications
International journal of circuit theory and applications, 2013P. Lugli +5 more
semanticscholar +1 more source
Strong Authentication for RFID Systems Using the AES Algorithm
Workshop on Cryptographic Hardware and Embedded Systems, 2004Martin Feldhofer +2 more
semanticscholar +1 more source
Machine Learning for Cryptographic Primitive Design
Jagjeet Singh Chauhan +2 moreopenaire +1 more source

