1. Cache attack detection in virtualized environments. Issue 5 (4th July 2019) Authors: Tank, Darshan; Aggarwal, Akshai; Chaubey, Nirbhay Journal: Journal of information & optimization sciences Issue: Volume 40:Issue 5(2019) Page Start: 1109 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Crypto-currency: Is the future dark or bright?. Issue 5 (4th July 2019) Authors: Yousuf Javed, Mohd.; Husain, Rehan; Khan, Bilal Mustafa; Azam, Mohammad Khalid Journal: Journal of information & optimization sciences Issue: Volume 40:Issue 5(2019) Page Start: 1081 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. An improved quantum key distribution protocol for verification. (19th May 2019) Authors: Kumar, Ankit; Dadheech, Pankaj; Singh, Vijander; Poonia, Ramesh C.; Raja, Linesh Journal: Journal of discrete mathematical sciences & cryptography Issue: Volume 22:Number 4(2019) Page Start: 491 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. An enhanced quantum key distribution protocol for security authentication. (19th May 2019) Authors: Kumar, Ankit; Dadheech, Pankaj; Singh, Vijander; Raja, Linesh; Poonia, Ramesh C. Journal: Journal of discrete mathematical sciences & cryptography Issue: Volume 22:Number 4(2019) Page Start: 499 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions. (October 2019) Authors: Datta, Pratish; Dutta, Ratna; Mukhopadhyay, Sourav Journal: Journal of information security and applications Issue: Volume 48(2019) Page Start: Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Insecure primitive elements in an ElGamal signature protocol. (4th May 2015) Authors: Khadir, Omar Journal: Journal of discrete mathematical sciences & cryptography Issue: Volume 18:Number 3(2015) Page Start: 237 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Bitcoin security with a twisted Edwards curve. (17th February 2022) Authors: Semmouni, Meryem Cherkaoui; Nitaj, Abderrahmane; Belkasmi, Mostafa Journal: Journal of discrete mathematical sciences & cryptography Issue: Volume 25:Number 2(2022) Page Start: 353 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. RM- RSA algorithm. (2nd January 2022) Authors: Reddy, L. Sreenivasulu Journal: Journal of discrete mathematical sciences & cryptography Issue: Volume 25:Number 1(2022) Page Start: 1 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. A new undeniable signature scheme on general linear group over group ring. (4th July 2022) Authors: Pandey, Atul; Gupta, Indivar Journal: Journal of discrete mathematical sciences & cryptography Issue: Volume 25:Number 5(2022) Page Start: 1261 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. A survey on implementation of lightweight block ciphers for resource constraints devices. (4th July 2022) Authors: Nayancy, ; Dutta, Sandip; Chakraborty, Soubhik Journal: Journal of discrete mathematical sciences & cryptography Issue: Volume 25:Number 5(2022) Page Start: 1377 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗