Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    Cryptanalysis of a key exchange protocol based on a congruence-simple semiring action

  • articleNo Access

    METAHEURISTIC TRACEABILITY ATTACK AGAINST SLMAP, AN RFID LIGHTWEIGHT AUTHENTICATION PROTOCOL

  • articleNo Access

    A Unified Method for Private Exponent Attacks on RSA Using Lattices

  • articleNo Access

    Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family

  • articleNo Access

    CRYPTANALYSIS OF A NEW CHAOTIC CRYPTOSYSTEM BASED ON ERGODICITY

  • articleNo Access

    A NEW CHAOTIC ENCRYPTION ALGORITHM BASED ON THE ERGODICITY OF CHAOS

  • articleNo Access

    Cryptanalysis and improvement of multiparty semiquantum secret sharing based on rearranging orders of qubits

  • articleNo Access

    Cryptanalysis and improvement of the novel semi-quantum secret sharing scheme based on Bell states

  • articleNo Access

    Cryptanalysis and improvement of the novel semi-quantum secret sharing scheme using entangled states

  • articleNo Access

    AN IMPROVEMENT OF REMOTE AUTHENTICATION AND KEY AGREEMENT SCHEMES

  • articleNo Access

    SECURITY ANALYSIS OF A FUZZY IDENTITY-BASED ENCRYPTION SCHEME

  • articleNo Access

    PROBLEMS WITH A PROBABILISTIC ENCRYPTION SCHEME BASED ON CHAOTIC SYSTEMS

  • articleNo Access

    CRYPTANALYSIS OF OBSERVER BASED DISCRETE-TIME CHAOTIC ENCRYPTION SCHEMES

  • articleNo Access

    RETURN-MAP CRYPTANALYSIS REVISITED

  • articleNo Access

    BREAKING A SC-CNN-BASED CHAOTIC MASKING SECURE COMMUNICATION SYSTEM

  • articleNo Access

    CRYPTANALYSIS OF CHAOTIC COMMUNICATION SCHEMES BY DYNAMICAL MINIMIZATION ALGORITHM

  • articleNo Access

    CRYPTANALYSIS OF FRIDRICH'S CHAOTIC IMAGE ENCRYPTION

  • articleNo Access

    BREAKING A CHAOTIC CRYPTOGRAPHIC SCHEME BASED ON COMPOSITION MAPS

  • articleNo Access

    CRYPTANALYSIS OF HYBRID CRYPTOSYSTEMS

  • articleNo Access

    Deciphering an Image Cipher Based on Mixed Transformed Logistic Maps