Attacking cryptosystems by means of virus machines. [PDF]
Pérez-Jiménez MJ+2 more
europepmc +1 more source
Efficient Algorithms for Pairing-Based Cryptosystems [PDF]
Paulo S. L. M. Barreto+3 more
openalex +1 more source
A cryptosystem for face recognition based on optical interference and phase truncation theory. [PDF]
Guo Y, Zhai P, Jia D, Li W.
europepmc +1 more source
Radix-4 modular multiplication and exponentiation algorithms for the RSA public-key cryptosystem [PDF]
Jinhua Hong, Cheng‐Wen Wu
openalex +1 more source
Cayley-Purser secured communication and jackknife correlative classification for COVID patient data analysis. [PDF]
Sekaran R+3 more
europepmc +1 more source
Cryptanalysis of the Original McEliece Cryptosystem
Anne Canteaut, Nicolas Sendrier
openalex +1 more source
Cryptographic key generation using deep learning with biometric face and finger vein data. [PDF]
Gizachew Yirga T+2 more
europepmc +1 more source
ESHA-256_GBGO: a high-performance and optimized security framework for internet of medical thing. [PDF]
Murugan G, Chinnadurai M.
europepmc +1 more source
Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems [PDF]
Roberto Avanzi
openalex +1 more source