Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
P. L. Sharma1, Kritika Gupta2, Nikhlesh Kumar Badoga3, Ashima4 and Himanshu Monga4
Cryptography
13, 1/2, April, 2022
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
Abderrahmane Daham, Mohamed Ouslim
Cryptography
14, 1, February, 2022
FAST IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOGRAPHIC ALGORITHM ON GF( 3^M) BASED ON FPGA
tan yongliang, he lesheng, jin haonan, kong qingyang
Cryptography
11, 17, October, 2021
Unforgettable User Defined Seed Phrase for Cryptocurrency Wallets
Cheman Shaik
Cryptography
10, 4, December, 2020
Securing Cryptocurrency Wallet Seed Phrase Digitally with Blind Key Encryption
Cheman Shaik
Cryptography
10, 4, December, 2020
SoK of Used Cryptography in Blockchain
M. Raikwar, D. Gligoroski, K. Kralevska
Cryptography
7, -, October, 2019
Privacy Enhanced Attribute based eSign
Puneet Bakshi, Sukumar Nandi
Cryptography
1, 1, April, 2020
Public-Key Based Authentication Architecture for IoT Devices Using PUF
Haji Akhundov
Cryptography
9, 13, November, 2019
A Fractal Based Image Cipher Using Knuth Shuffle Method and Dynamic Diffusion
Shafali Agarwal
Cryptography
11, 4, July, 2019
STEGANOGRAPHY BASED ASYMMETRIC KEY CRYPTOSYSTEM USING TRELLIS CODED GENETIC ALGORITHM RANDOM KEY GENERATOR
Anusha T and Venkatesan R
Cryptography
Vol 9, No.1, March, 2019
A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64
Alya Geogiana Buja, Shekh Faisal Abdul-Latip, Rabiah Ahmad
Cryptography
10, 4, July, 2018
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
Mohammed A. Al-taha and Ra’ad A. Muhajjar
Cryptography
10, 3, May, 2018
Lightweight Cryptography for Distributed PKI Based MANETS
N Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, and V. Ch. Venkaiah
Cryptography
10, 2, March, 2018
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
Rahul Krishnan
Cryptography
8, 1, March, 2018
The Game of Phishing
Joseph Kilcullen
Cryptography
8, 1, March, 2018
The Game of Phishing
Joseph Kilcullen
Cryptography
8, 1, March, 2018
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
Rahul Krishnan
Cryptography
8, 1, March, 2018
1
2