Results 261 to 270 of about 1,801,560 (284)
Some of the next articles are maybe not open access.
A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish
Procedia Computer Science, 2016Narayan Dg
exaly
Improve the Onion Routing Performance and Security with Cryptographic Algorithms
International Journal on Recent and Innovation Trends in Computing and Communication, 2023exaly
Reasoning about belief in cryptographic protocols
Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, 1990L. Gong, R. Needham, Raphael Yahalom
semanticscholar +1 more source
Convolutional neural network attack on cryptographic circuits
Electronics Letters, 2019Weize Yu
exaly
A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols
Mathematical Methods, Models, and Architectures for Network Security Systems, 2010D. Moldovyan, N. Moldovyan
semanticscholar +1 more source
Physically unclonable cryptographic primitives using self-assembled carbon nanotubes
Nature Nanotechnology, 2016Hongsik Park+2 more
exaly
Cost-effective secure E-health cloud system using identity based cryptographic techniques
Future Generation Computer Systems, 2017Xu An Wang, Fatos Xhafa
exaly