public-key cryptographic protocols
Key Management Schemes in MANET: A Review
10
Kleptography trapdoor free cryptographic protocols
13
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
19
Volume 2, Issue 3, March 2013 Page 72
9
Cryptographic Protocols Based on Nielsen Transformations
46
Classical Cryptographic Protocols in a Quantum World
37
Abstracting cryptographic protocols
317
Domain-specific Accelerators for Ideal Lattice-based Public Key Protocols
17
The Peruvian coin flip Cryptographic protocols
11
Using El Gamal Cryptosystem in Message Feedback Mode for Computing Cost Reduction
5
A COMPLETE SECURED CRYPTOGRAPHIC FRAMEWORK FOR CLOUD COMPUTING ENVIRONMENTS
13
IMPLEMENTATION AND PERFORMANCE EVALUATION OF MODULO AND MONTGOMERY MULTIPLIERS IN REAL TIME APPLICATION
11
Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations
67
Performance analysis of cryptographic protocols on handheld devices
6
Ensuring Confidentiality in Cryptographic Protocols with the Witness-Functions
15
Secure Search Scheme over Encrypted Cloud Data Using Greedy Depth First Search Algorithm
6
A. The Diffie-Hellman protocol
5
Securing Mobile Payment Systems: Using Personal Identification Number (PIN) Method
12
Deniable Key Exchange for Privacy Preservation in ON-LINE Shopping
5
Improved SPI Calculus for Reasoning on Cryptographic Protocols
8