Facet browsing currently unavailable
Page 2 of 320 results
Sort by: relevance publication year
Foundations of Programmable Secure Computation JOURNAL ARTICLE published 21 August 2021 in Cryptography Research funded by Estonian Personal Research Grant (920) |
Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization JOURNAL ARTICLE published 30 July 2020 in Cryptography |
Random Number Generators: Principles and Applications JOURNAL ARTICLE published 30 October 2023 in Cryptography |
Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources JOURNAL ARTICLE published 13 November 2020 in Cryptography |
An Engineered Minimal-Set Stimulus for Periodic Information Leakage Fault Detection on a RISC-V Microprocessor JOURNAL ARTICLE published 22 April 2024 in Cryptography |
Generalized Concatenated Codes over Gaussian and Eisenstein Integers for Code-Based Cryptography JOURNAL ARTICLE published 29 November 2021 in Cryptography Research funded by Federal Ministry of Education and Research (16ES1045) |
Blockchain of Resource-Efficient Anonymity Protection with Watermarking for IoT Big Data Market JOURNAL ARTICLE published 30 September 2022 in Cryptography Research funded by Ministry of Science and Technology, Taiwan (MOST 110-2221-E-130-001) |
Quantum Identity-Based Encryption from the Learning with Errors Problem JOURNAL ARTICLE published 16 February 2022 in Cryptography |
Security Analysis of Lightweight IoT Cipher: Chaskey JOURNAL ARTICLE published 5 August 2020 in Cryptography |
Can Ternary Computing Improve Information Assurance? JOURNAL ARTICLE published 2 March 2018 in Cryptography Research funded by US Air Force (FA8075-16-D-0001) |
Novel and Efficient Privacy-Preserving Continuous Authentication JOURNAL ARTICLE published 24 January 2024 in Cryptography Research funded by European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie (860315) |
Attacking Windows Hello for Business: Is It What We Were Promised? JOURNAL ARTICLE published 14 February 2023 in Cryptography Research funded by Horizon Europe Project Trust (GA 101070214) |
Shift Register, Reconvergent-Fanout (SiRF) PUF Implementation on an FPGA JOURNAL ARTICLE published 11 November 2022 in Cryptography |
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures JOURNAL ARTICLE published 31 January 2024 in Cryptography |
Correlation-Based Robust Authentication (Cobra) Using Helper Data Only JOURNAL ARTICLE published 31 August 2018 in Cryptography |
CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion JOURNAL ARTICLE published 19 December 2018 in Cryptography |
A Text-Independent Speaker Authentication System for Mobile Devices JOURNAL ARTICLE published 22 September 2017 in Cryptography |
Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps JOURNAL ARTICLE published 7 April 2023 in Cryptography |
Multiverse of HawkNess: A Universally-Composable MPC-Based Hawk Variant JOURNAL ARTICLE published 4 August 2022 in Cryptography Research funded by Science Foundation Ireland (13/RC/2106,17/SP/5447) |
An Autonomous, Self-Authenticating, and Self-Contained Secure Boot Process for Field-Programmable Gate Arrays JOURNAL ARTICLE published 18 July 2018 in Cryptography |