You are on page 1of 1

-DNA computing-based cryptography

-Security and Trust of Public Key Cryptography Options for HIP


-Opportunities in White-Box Cryptography
-Security of entanglement based version of BB84 protocol for Quantum Cryptograph
y
-Implementation of secure key distribution based on quantum cryptography
-Finite Field Arithmetic for Cryptography
-Teaching Cryptography-based Software Developing with Open-source Software
-Fidelity analysis of quantum cloning based attacks in quantum cryptography
-Chaos theory and its application in modern cryptography
-Multilevel access control in defense messaging system using Elliptic curve cryp
tography
-Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Base
d Cryptography
-Taking Flexible and Diverse Approaches to Get Undergraduate Students Interested
in Cryptography Course
-TIBC: Trade-off between Identity-Based and Certificateless Cryptography for fut
ure internet
-Error correction over wireless channels using symmetric cryptography
-A Provably Secure Threshold Ring Signature Scheme in Certificateless Cryptograp
hy
-9866318017

You might also like