public-key cryptographic algorithms
Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications
10
Analyzing the speed of combined cryptographic algorithms with secret and public key
7
Cryptographic Algorithms analyzing of Different Combination with Secret and Public Key using Text and Audio Files using LabView
7
Cryptographic Algorithms Analyzing of Different Combination with Secret and Public Key using Text and Audio Files: A Review
5
Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key
21
Comparison of Time Complexity of Symmetric and Asymmetric Key Cryptographic Algorithms
5
COMAPARISON OF CRYPTOGRAPHIC ALGORITHMS FOR CLOUD COMPUTING
7
A Review on Public Key Cryptography: Algorithms
7
Volume 2, Issue 3, March 2013 Page 72
9
IMPLEMENTATION AND PERFORMANCE EVALUATION OF MODULO AND MONTGOMERY MULTIPLIERS IN REAL TIME APPLICATION
11
Network Security Issues and Cryptography
6
Key Management Schemes in MANET: A Review
10
Review of Image Splicing Forgeries
11
Using El Gamal Cryptosystem in Message Feedback Mode for Computing Cost Reduction
5
Design of RSA Digital Signature Scheme Using A Novel Cryptographic Hash Algorithm
5
Encrypt-FS: A Versatile Cryptographic File System for Linux
12
AN APPROACH FOR IoT SECURITY USING QUANTUM KEY DISTRIBUTION
6
Certificateless Public Key Signature Schemes from Standard Algorithms
36
Secure Search Scheme over Encrypted Cloud Data Using Greedy Depth First Search Algorithm
6
Study on Computer Generated Electromagnetic Effects on Computer Users
5