Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Deterministic Algorithm Computing All Generators: Application in Cryptographic Systems Design
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.5 No.11
,November 26, 2012
DOI:
10.4236/ijcns.2012.511074
4,333
Downloads
6,166
Views
Citations
Faster Method for Secure Transmission of Information with Sender Identification
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.6 No.2
,February 26, 2013
DOI:
10.4236/ijcns.2013.62009
3,873
Downloads
5,691
Views
Citations
TUP: A New eCK-Secure AKE Protocol under the CDH Assumption
(Articles)
Qinglei Zhou
,
Zengfu Yang
Int'l J. of Communications, Network and System Sciences
Vol.5 No.6
,June 12, 2012
DOI:
10.4236/ijcns.2012.56043
3,433
Downloads
5,889
Views
Citations
Enhanced Euclid Algorithm for Modular Multiplicative Inverse and Its Application in Cryptographic Protocols
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.3 No.12
,December 27, 2010
DOI:
10.4236/ijcns.2010.312123
6,661
Downloads
11,898
Views
Citations
Information Protection Based on Extraction of Square Roots of Gaussian Integers
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.3
,March 10, 2011
DOI:
10.4236/ijcns.2011.43016
4,424
Downloads
8,453
Views
Citations
A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography
(Articles)
Krishnan Kumar
,
J. Nafeesa Begum
,
V. Sumathy
Int'l J. of Communications, Network and System Sciences
Vol.3 No.4
,April 30, 2010
DOI:
10.4236/ijcns.2010.34047
5,169
Downloads
9,260
Views
Citations
A New Approach for the DFT NIST Test Applicable for Non-Stationary Input Sequences
(Articles)
Yehonatan Avraham
,
Monika Pinchas
Journal of Signal and Information Processing
Vol.12 No.1
,February 26, 2021
DOI:
10.4236/jsip.2021.121001
379
Downloads
952
Views
Citations
A Novel Pseudo Random Number Generator Based on Two Plasmonic Maps
(Articles)
Michael François
,
Thomas Grosges
,
Dominique Barchiesi
,
Robert Erra
Applied Mathematics
Vol.3 No.11
,November 20, 2012
DOI:
10.4236/am.2012.311230
4,449
Downloads
7,042
Views
Citations
Public-Key Cryptosystems with Secret Encryptor and Digital Signature
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.6 No.1
,January 29, 2013
DOI:
10.4236/ijcns.2013.61001
4,179
Downloads
6,042
Views
Citations
Double-Moduli Gaussian Encryption/Decryption with Primary Residues and Secret Controls
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.7
,July 25, 2011
DOI:
10.4236/ijcns.2011.47058
4,570
Downloads
8,416
Views
Citations
Scheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.2
,February 26, 2011
DOI:
10.4236/ijcns.2011.42009
4,242
Downloads
7,605
Views
Citations
Acceleration of Homomorphic Arithmetic Processing Based on the ElGamal Cryptosystem
(Articles)
Takuma Jogan
,
Tomofumi Matsuzawa
,
Masayuki Takeda
Communications and Network
Vol.11 No.1
,January 24, 2019
DOI:
10.4236/cn.2019.111001
1,182
Downloads
2,689
Views
Citations
Variant Map System to Simulate Complex Properties of DNA Interactions Using Binary Sequences
(Articles)
Jeffrey Zheng
,
Weiqiong Zhang
,
Jin Luo
,
Wei Zhou
,
Ruoyu Shen
Advances in Pure Mathematics
Vol.3 No.7A
,October 24, 2013
DOI:
10.4236/apm.2013.37A002
3,712
Downloads
6,150
Views
Citations
This article belongs to the Special Issue on
Number Theory and Crytography
The Pattern of Prime Numbers
(Articles)
José William Porras Ferreira
Applied Mathematics
Vol.8 No.2
,February 24, 2017
DOI:
10.4236/am.2017.82015
5,473
Downloads
11,822
Views
Citations
Optimization and Sizing of a Stand-Alone Photovoltaic System and Assessment of Random Load Fluctuation on Power Supply
(Articles)
Leonard Akana Nguimdo
,
Clinton Kum
Energy and Power Engineering
Vol.12 No.1
,January 15, 2020
DOI:
10.4236/epe.2020.121003
943
Downloads
3,173
Views
Citations
Primality Test
(Articles)
Gabriele Martino
American Journal of Computational Mathematics
Vol.3 No.1
,March 28, 2013
DOI:
10.4236/ajcm.2013.31009
4,262
Downloads
6,725
Views
Citations
Preliminary Identification of a Prime Number Other Than 2 and 3, the Origin of Twin Prime Numbers, the Structure of the Chain of Prime Numbers and the Set of Prime Numbers Less Than a Given Integer
(Articles)
Mady Ndiaye
Advances in Pure Mathematics
Vol.14 No.1
,January 31, 2024
DOI:
10.4236/apm.2024.141003
115
Downloads
766
Views
Citations
Survey on Public Key Cryptography Scheme for Securing Data in Cloud Computing
(Articles)
J. Athena
,
V. Sumathy
Circuits and Systems
Vol.8 No.3
,March 31, 2017
DOI:
10.4236/cs.2017.83005
2,056
Downloads
4,501
Views
Citations
Information Field and Physical Noise Generator Entanglement
(Articles)
Marcus Schmieke
Journal of Modern Physics
Vol.14 No.6
,May 31, 2023
DOI:
10.4236/jmp.2023.146054
114
Downloads
706
Views
Citations
New Practical Algebraic Public-Key Cryptosystem and Some Related Algebraic and Computational Aspects
(Articles)
S. K. Rososhek
Applied Mathematics
Vol.4 No.7
,July 11, 2013
DOI:
10.4236/am.2013.47142
3,574
Downloads
5,079
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top