Results 261 to 270 of about 375,459 (282)
Some of the next articles are maybe not open access.
From Biometric Data to Cryptographic Primitives: A New Method for Generation of Substitution Boxes
International Conference on Biomedical Engineering and Biotechnology, 2017F. Özkaynak
semanticscholar +1 more source
Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation
The Cryptographer's Track at RSA Conference, 2014Markku-Juhani O. Saarinen
semanticscholar +1 more source
Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures
Proceedings of the IEEE, 2012Alessandro Barenghi, Hideki Taguchi
exaly
A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish
Procedia Computer Science, 2016Narayan Dg
exaly
Improve the Onion Routing Performance and Security with Cryptographic Algorithms
International Journal on Recent and Innovation Trends in Computing and Communication, 2023exaly
Convolutional neural network attack on cryptographic circuits
Electronics Letters, 2019Weize Yu
exaly
Foundations of garbled circuits
Conference on Computer and Communications Security, 2012M. Bellare, Viet Tung Hoang, P. Rogaway
semanticscholar +1 more source
Physical unclonable functions based on crossbar arrays for cryptographic applications
International journal of circuit theory and applications, 2013P. Lugli+5 more
semanticscholar +1 more source
Strong Authentication for RFID Systems Using the AES Algorithm
Workshop on Cryptographic Hardware and Embedded Systems, 2004Martin Feldhofer+2 more
semanticscholar +1 more source