Loading [MathJax]/jax/output/CommonHTML/jax.js
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    Integrating Fuzzy Graph Theory into Cryptography: A Survey of Techniques and Security Applications

  • articleNo Access

    Verifiable secret sharing with changeable access structure

  • articleNo Access

    Several Generalizations of Shamir's Secret Sharing Scheme

  • articleNo Access

    A NEW CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME BASED ON THE ELGAMAL CRYPTOSYSTEM

  • articleNo Access

    LOWER BOUNDS ON THE SECOND ORDER NONLINEARITY OF BOOLEAN FUNCTIONS

  • articleNo Access

    RATIONAL MULTI-SECRET SHARING SCHEME IN STANDARD POINT-TO-POINT COMMUNICATION NETWORKS

  • articleNo Access

    Linear Complexity of Binary Threshold Sequences Derived from Generalized Polynomial Quotient with Prime-Power Modulus

  • articleNo Access

    Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family

  • articleNo Access

    STEP TO IMPROVE NEURAL CRYPTOGRAPHY AGAINST FLIPPING ATTACKS

  • articleOpen Access

    Using Virus Machines to Compute Pairing Functions

  • articleNo Access

    A Federated Learning Protocol for Spiking Neural Membrane Systems

  • articleNo Access

    CELLULAR AUTOMATA CRYPTOGRAPHIC MODEL BASED ON BI-DIRECTIONAL TOGGLE RULES

  • articleNo Access

    SHARING SECRETS USING ELEMENTARY CELLULAR AUTOMATA

  • articleNo Access

    A (2, n)-SECRET SHARING SCHEME BASED ON LINEAR CELLULAR AUTOMATA

  • articleNo Access

    A COMPETITIVE SEARCHING-BASED CHAOTIC CIPHER

  • articleNo Access

    A DESIGN OF PSEUDO-RANDOM BIT GENERATOR BASED ON SINGLE CHAOTIC SYSTEM

  • articleNo Access

    WAVELET MULTIFRACTAL DETRENDED FLUCTUATION ANALYSIS OF ENCRYPTION AND DECRYPTION MATRICES

  • articleNo Access

    COLOR IMAGE ENCRYPTION BASED ON TWO-DIMENSIONAL CELLULAR AUTOMATA

  • articleNo Access

    A PSEUDO-RANDOM NUMBER GENERATOR EMPLOYING MULTIPLE RÉNYI MAPS

  • articleNo Access

    Reservoir computing on the hypersphere