Results 321 to 330 of about 535,713 (347)
Some of the next articles are maybe not open access.

Binary and prime field multiplication for public key cryptography on embedded microprocessors

Secur. Commun. Networks, 2014
Hwajeong Seo   +4 more
semanticscholar   +1 more source

A light-weight certificate-less public key cryptography scheme based on ECC

International Conference on Computer Communications and Networks, 2014
Xuanxia Yao, Xiaoguang Han, Xiaojiang Du
semanticscholar   +1 more source

Post-quantum cryptography

Nature, 2017
Daniel J Bernstein, Tanja Lange
exaly  

High-rate measurement-device-independent quantum cryptography

Nature Photonics, 2015
Stefano Pirandola   +2 more
exaly  

Public key cryptography using neural networks and genetic algorithms

International Conference on Contemporary Computing, 2013
Smita Jhajharia, Swati Mishra, S. Bali
semanticscholar   +1 more source

Securing M2M With Post-Quantum Public-Key Cryptography

IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 2013
Jie-Ren Shih   +7 more
semanticscholar   +1 more source

Post-Quantum Lattice-Based Cryptography Implementations

ACM Computing Surveys, 2019
Hamid Nejatollahi   +2 more
exaly  

Home - About - Disclaimer - Privacy