Author:
Barker E B,Barker W C,Burr W E,Polk W T,Smid M E
Publisher
National Institute of Standards and Technology
Cited by
60 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Software-Based Low-Latency Elliptic Curve Cryptography Design Over Prime Fields;2024 18th International Conference on Ubiquitous Information Management and Communication (IMCOM);2024-01-03
2. JumpCrypt: Based on Precomputing Federated Learning with Homomorphic Encryption;2023 IEEE International Conference on High Performance Computing & Communications, Data Science & Systems, Smart City & Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys);2023-12-17
3. Consumer-source authentication with conditional anonymity in information-centric networking;Information Sciences;2023-05
4. Unidirectional Updatable Encryption and Proxy Re-encryption from DDH;Lecture Notes in Computer Science;2023
5. Improving the Efficiency of a Blockchain-Based Confidential Registered e-Delivery Protocol;Lecture Notes in Business Information Processing;2022