Publisher: MDPI
Founded in: 2016
Total resources: 2
E-ISSN: 2410-387x
ISSN: 2410-387x
Subject: TP3 Computers
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Menu
Can Ternary Computing Improve Information Assurance?
By Cambou Bertrand,Flikkema Paul G.,Palmer James,Telesca Donald,Philabaum Christopher in (2018)
Cryptography , Vol. 2, Iss. 1, 2018-03 , pp.Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT
By Suomalainen Jani,Kotelba Adrian,Kreku Jari,Lehtonen Sami in (2018)
Cryptography , Vol. 2, Iss. 1, 2018-02 , pp.Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
By Salam Iftekhar,Simpson Leonie,Bartlett Harry,Dawson Ed,Koon-Ho Wong Kenneth in (2018)
Cryptography , Vol. 2, Iss. 1, 2018-01 , pp.On the Cryptographic Features of a VoIP Service
By Alvanos Dimitrios,Limniotis Konstantinos,Stavrou Stavros in (2018)
Cryptography , Vol. 2, Iss. 1, 2018-01 , pp.Acknowledgement to Reviewers of
Multi-Factor Authentication: A Survey
By Ometov Aleksandr,Bezzateev Sergey,Mäkitalo Niko,Andreev Sergey,Mikkonen Tommi,Koucheryavy Yevgeni in (2018)
Cryptography , Vol. 2, Iss. 1, 2018-01 , pp.Cryptanalysis and Improvement of ECC Based Authentication and Key Exchanging Protocols
By Roy Swapnoneel,Khatwani Chanchal in (2017)
Cryptography , Vol. 1, Iss. 1, 2017-06 , pp.Analysis of Entropy in a Hardware-Embedded Delay PUF
By Che Wenjie,Kajuluri Venkata K.,Martin Mitchell,Saqib Fareena,Plusquellic Jim in (2017)
Cryptography , Vol. 1, Iss. 1, 2017-06 , pp.Maximum-Order Complexity and Correlation Measures
By Işık Leyla,Winterhof Arne in (2017)
Cryptography , Vol. 1, Iss. 1, 2017-05 , pp.By Kashefi Elham,Wallden Petros in (2017)
Cryptography , Vol. 1, Iss. 1, 2017-04 , pp.