ESHA-256_GBGO: a high-performance and optimized security framework for internet of medical thing. [PDF]
Murugan G, Chinnadurai M.
europepmc +1 more source
An efficient image encryption algorithm using 3D-cyclic chebyshev map and elliptic curve. [PDF]
Kanwal S +5 more
europepmc +1 more source
Identity-Based Efficient Secure Data Communication Protocol for Hierarchical Sensor Groups in Smart Grid. [PDF]
Feng Y, Sun Y, Cao Y, Xu B, Li Y.
europepmc +1 more source
On Multivariate Public-Key Cryptosystems
Nowadays cryptographic technologies are widely used in the information society. The theme of this paper is public-key cryptosystems (PKCs). PKCs are systems which need two separate keys: a public-key and a secret-key. This system is one of the most powerful tools in modern cryptography. One of the typical applications of PKCs is public-key encryptions,
openaire
Information-set decoding for convolutional codes. [PDF]
Gassner N +3 more
europepmc +1 more source
A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure. [PDF]
Kara M, Hammoudeh M, Alamri A, Alamri S.
europepmc +1 more source
A novel development to encrypt data communication under t-intuitionistic fuzzy environment. [PDF]
Alolaiyan H +4 more
europepmc +1 more source
A novel method for generating public keys involving matrix operations. [PDF]
Sun X, Han J, Lv B, Sun C, Zeng C.
europepmc +1 more source
Secure computation protocol of Chebyshev distance under the malicious model. [PDF]
Liu X +7 more
europepmc +1 more source
Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing. [PDF]
Zhao M, Chen H.
europepmc +1 more source

