Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Deterministic Algorithm Computing All Generators: Application in Cryptographic Systems Design
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.5 No.11
,November 26, 2012
DOI:
10.4236/ijcns.2012.511074
4,359
Downloads
6,272
Views
Citations
Faster Method for Secure Transmission of Information with Sender Identification
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.6 No.2
,February 26, 2013
DOI:
10.4236/ijcns.2013.62009
3,894
Downloads
5,778
Views
Citations
TUP: A New eCK-Secure AKE Protocol under the CDH Assumption
(Articles)
Qinglei Zhou
,
Zengfu Yang
Int'l J. of Communications, Network and System Sciences
Vol.5 No.6
,June 12, 2012
DOI:
10.4236/ijcns.2012.56043
3,468
Downloads
5,997
Views
Citations
Enhanced Euclid Algorithm for Modular Multiplicative Inverse and Its Application in Cryptographic Protocols
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.3 No.12
,December 27, 2010
DOI:
10.4236/ijcns.2010.312123
6,727
Downloads
12,100
Views
Citations
Information Protection Based on Extraction of Square Roots of Gaussian Integers
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.3
,March 10, 2011
DOI:
10.4236/ijcns.2011.43016
4,467
Downloads
8,578
Views
Citations
A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography
(Articles)
Krishnan Kumar
,
J. Nafeesa Begum
,
V. Sumathy
Int'l J. of Communications, Network and System Sciences
Vol.3 No.4
,April 30, 2010
DOI:
10.4236/ijcns.2010.34047
5,238
Downloads
9,408
Views
Citations
A New Approach for the DFT NIST Test Applicable for Non-Stationary Input Sequences
(Articles)
Yehonatan Avraham
,
Monika Pinchas
Journal of Signal and Information Processing
Vol.12 No.1
,February 26, 2021
DOI:
10.4236/jsip.2021.121001
420
Downloads
1,077
Views
Citations
A Novel Pseudo Random Number Generator Based on Two Plasmonic Maps
(Articles)
Michael François
,
Thomas Grosges
,
Dominique Barchiesi
,
Robert Erra
Applied Mathematics
Vol.3 No.11
,November 20, 2012
DOI:
10.4236/am.2012.311230
4,475
Downloads
7,139
Views
Citations
Public-Key Cryptosystems with Secret Encryptor and Digital Signature
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.6 No.1
,January 29, 2013
DOI:
10.4236/ijcns.2013.61001
4,200
Downloads
6,134
Views
Citations
Double-Moduli Gaussian Encryption/Decryption with Primary Residues and Secret Controls
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.7
,July 25, 2011
DOI:
10.4236/ijcns.2011.47058
4,601
Downloads
8,516
Views
Citations
Scheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.2
,February 26, 2011
DOI:
10.4236/ijcns.2011.42009
4,262
Downloads
7,706
Views
Citations
Acceleration of Homomorphic Arithmetic Processing Based on the ElGamal Cryptosystem
(Articles)
Takuma Jogan
,
Tomofumi Matsuzawa
,
Masayuki Takeda
Communications and Network
Vol.11 No.1
,January 24, 2019
DOI:
10.4236/cn.2019.111001
1,218
Downloads
2,815
Views
Citations
Variant Map System to Simulate Complex Properties of DNA Interactions Using Binary Sequences
(Articles)
Jeffrey Zheng
,
Weiqiong Zhang
,
Jin Luo
,
Wei Zhou
,
Ruoyu Shen
Advances in Pure Mathematics
Vol.3 No.7A
,October 24, 2013
DOI:
10.4236/apm.2013.37A002
3,770
Downloads
6,288
Views
Citations
This article belongs to the Special Issue on
Number Theory and Crytography
The Pattern of Prime Numbers
(Articles)
José William Porras Ferreira
Applied Mathematics
Vol.8 No.2
,February 24, 2017
DOI:
10.4236/am.2017.82015
5,519
Downloads
12,848
Views
Citations
Optimization and Sizing of a Stand-Alone Photovoltaic System and Assessment of Random Load Fluctuation on Power Supply
(Articles)
Leonard Akana Nguimdo
,
Clinton Kum
Energy and Power Engineering
Vol.12 No.1
,January 15, 2020
DOI:
10.4236/epe.2020.121003
1,000
Downloads
3,457
Views
Citations
Primality Test
(Articles)
Gabriele Martino
American Journal of Computational Mathematics
Vol.3 No.1
,March 28, 2013
DOI:
10.4236/ajcm.2013.31009
4,319
Downloads
6,910
Views
Citations
Preliminary Identification of a Prime Number Other Than 2 and 3, the Origin of Twin Prime Numbers, the Structure of the Chain of Prime Numbers and the Set of Prime Numbers Less Than a Given Integer
(Articles)
Mady Ndiaye
Advances in Pure Mathematics
Vol.14 No.1
,January 31, 2024
DOI:
10.4236/apm.2024.141003
132
Downloads
897
Views
Citations
Survey on Public Key Cryptography Scheme for Securing Data in Cloud Computing
(Articles)
J. Athena
,
V. Sumathy
Circuits and Systems
Vol.8 No.3
,March 31, 2017
DOI:
10.4236/cs.2017.83005
2,089
Downloads
4,682
Views
Citations
New Practical Algebraic Public-Key Cryptosystem and Some Related Algebraic and Computational Aspects
(Articles)
S. K. Rososhek
Applied Mathematics
Vol.4 No.7
,July 11, 2013
DOI:
10.4236/am.2013.47142
3,599
Downloads
5,182
Views
Citations
Information Field and Physical Noise Generator Entanglement
(Articles)
Marcus Schmieke
Journal of Modern Physics
Vol.14 No.6
,May 31, 2023
DOI:
10.4236/jmp.2023.146054
137
Downloads
876
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top