Results 321 to 330 of about 535,713 (347)
Some of the next articles are maybe not open access.
Binary and prime field multiplication for public key cryptography on embedded microprocessors
Secur. Commun. Networks, 2014Hwajeong Seo +4 more
semanticscholar +1 more source
A light-weight certificate-less public key cryptography scheme based on ECC
International Conference on Computer Communications and Networks, 2014Xuanxia Yao, Xiaoguang Han, Xiaojiang Du
semanticscholar +1 more source
High-rate measurement-device-independent quantum cryptography
Nature Photonics, 2015Stefano Pirandola +2 more
exaly
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography
ACM Computing Surveys, 2022exaly
Public key cryptography using neural networks and genetic algorithms
International Conference on Contemporary Computing, 2013Smita Jhajharia, Swati Mishra, S. Bali
semanticscholar +1 more source
Securing M2M With Post-Quantum Public-Key Cryptography
IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 2013Jie-Ren Shih +7 more
semanticscholar +1 more source
Post-Quantum Lattice-Based Cryptography Implementations
ACM Computing Surveys, 2019Hamid Nejatollahi +2 more
exaly

