Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
  • P. L. Sharma1, Kritika Gupta2, Nikhlesh Kumar Badoga3, Ashima4 and Himanshu Monga4
  • Cryptography
  • 13, 1/2, April, 2022

  • ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
  • Abderrahmane Daham, Mohamed Ouslim
  • Cryptography
  • 14, 1, February, 2022

  • FAST IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOGRAPHIC ALGORITHM ON GF( 3^M) BASED ON FPGA
  • tan yongliang, he lesheng, jin haonan, kong qingyang
  • Cryptography
  • 11, 17, October, 2021

  • Unforgettable User Defined Seed Phrase for Cryptocurrency Wallets
  • Cheman Shaik
  • Cryptography
  • 10, 4, December, 2020

  • Securing Cryptocurrency Wallet Seed Phrase Digitally with Blind Key Encryption
  • Cheman Shaik
  • Cryptography
  • 10, 4, December, 2020

  • SoK of Used Cryptography in Blockchain
  • M. Raikwar, D. Gligoroski, K. Kralevska
  • Cryptography
  • 7, -, October, 2019

  • Privacy Enhanced Attribute based eSign
  • Puneet Bakshi, Sukumar Nandi
  • Cryptography
  • 1, 1, April, 2020

  • Public-Key Based Authentication Architecture for IoT Devices Using PUF
  • Haji Akhundov
  • Cryptography
  • 9, 13, November, 2019

  • A Fractal Based Image Cipher Using Knuth Shuffle Method and Dynamic Diffusion
  • Shafali Agarwal
  • Cryptography
  • 11, 4, July, 2019

  • STEGANOGRAPHY BASED ASYMMETRIC KEY CRYPTOSYSTEM USING TRELLIS CODED GENETIC ALGORITHM RANDOM KEY GENERATOR
  • Anusha T and Venkatesan R
  • Cryptography
  • Vol 9, No.1, March, 2019

  • A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64
  • Alya Geogiana Buja, Shekh Faisal Abdul-Latip, Rabiah Ahmad
  • Cryptography
  • 10, 4, July, 2018

  • SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
  • Mohammed A. Al-taha and Ra’ad A. Muhajjar
  • Cryptography
  • 10, 3, May, 2018

  • Lightweight Cryptography for Distributed PKI Based MANETS
  • N Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, and V. Ch. Venkaiah
  • Cryptography
  • 10, 2, March, 2018

  • PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
  • Rahul Krishnan
  • Cryptography
  • 8, 1, March, 2018

  • The Game of Phishing
  • Joseph Kilcullen
  • Cryptography
  • 8, 1, March, 2018

  • The Game of Phishing
  • Joseph Kilcullen
  • Cryptography
  • 8, 1, March, 2018

  • PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
  • Rahul Krishnan
  • Cryptography
  • 8, 1, March, 2018

1  2 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals