Author:
Mujeerulla Mohammed,Preethi ,Khan Md. Sameeruddin,Sakkari Deepak S.
Publisher
Springer Science and Business Media LLC
Reference15 articles.
1. Cherkaoui, I.: Diffie-Hellman multi-challenge using a new lossy trapdoor function construction. IAENG Int. J. Appl. Math. 51(3), 736–742 (2021)
2. Zhu, K.; Wang, J.; Yang, Y.: Lattices of (Generalized) fuzzy ideals in residuated lattices. IAENG Int. J. Appl. Math. 50(3), 505–511 (2020)
3. Zhang, X.; Wang, X.: “Digital image encryption algorithm based on elliptic curve public cryptosystem. IEEE 6:70025–70034. ISSN: 2169-3536.
4. Breitner, J.; Heninger, N.: Biased nonce sense: lattice attacks against weak ECDSA signatures in cryptocurrencies. Lecture Notes in Computer Science 2019 Springer International Publishing - Financial Cryptography and Data Security.
5. Khan, M.A.; Quasim, M. T.; Alghamdi, N. S.; Khan, M. Y.: A secure framework for authentication and encryption using improved ECC for IoT-based medical sensor data. IEEE 8, 52018–52027. ISSN: 2169-3536.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Apple Diseases Detection: Based On Deep Learning;2023 International Conference on New Frontiers in Communication, Automation, Management and Security (ICCAMS);2023-10-27
2. Innovation Is the Key For Ai Application;2023 International Conference on New Frontiers in Communication, Automation, Management and Security (ICCAMS);2023-10-27