Sr no. | Topic Name | IEEE |
---|---|---|
688 | “Online Transaction Security Enhancement”: An Algorithm Based on Cryptography Read Abstact & get paper Ask from Whatsapp |
2019 |
689 | A Review on DNA based Cryptography for Data hiding Read Abstact & get paper Ask from Whatsapp |
2019 |
690 | A Simple and Secured Cryptography System of Cloud Computing Read Abstact & get paper Ask from Whatsapp |
2019 |
691 | A Survey on Cryptography: comparative study between RSA vs ECC Algorithms, and RSA vs El-Gamal Algorithms Read Abstact & get paper Ask from Whatsapp |
2019 |
692 | An Efficient ASIC Implementation of Public Key Cryptography Algorithm SM2 Based on Module Arithmetic Logic Unit Read Abstact & get paper Ask from Whatsapp |
2020 |
693 | Advancements in Reversible Data Hiding in Encrypted Images Using Public Key Cryptography Read Abstact & get paper Ask from Whatsapp |
2020 |
694 | Analysis on Hybrid Approach for (K,N) Secret Sharing in Visual Cryptography Read Abstact & get paper Ask from Whatsapp |
2019 |
695 | Authenticating Cryptography over Network in Data Read Abstact & get paper Ask from Whatsapp |
2019 |
696 | Authenticating Cryptography over Network in Data Read Abstact & get paper Ask from Whatsapp |
2019 |
697 | Comparative Analysis of Lightweight Cryptography Algorithms on Resource Constrained Microcontrollers Read Abstact & get paper Ask from Whatsapp |
2019 |
698 | EFFECTIVE APPROACH TO PROTECT IMAGES BY USING BOTH CRYPTOGRAPHY AND STEGANOGRAPHY Read Abstact & get paper Ask from Whatsapp |
2019 |
699 | Framework for Financial Auditing Process Through Blockchain Technology, using Identity Based Cryptography Read Abstact & get paper Ask from Whatsapp |
2019 |
700 | High-Secure Fingerprint Authentication System using Ring-LWE Cryptography Read Abstact & get paper Ask from Whatsapp |
2018 |
701 | k out of n Region-Based Progressive Visual Cryptography1 Read Abstact & get paper Ask from Whatsapp |
2017 |
702 | Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things Read Abstact & get paper Ask from Whatsapp |
2018 |
703 | Neural Cryptography Based on Complex-Valued Neural Network Read Abstact & get paper Ask from Whatsapp |
2019 |
704 | Optical Asymmetric Key Cryptography in RoFSO for High Security using Ring Resonator System Read Abstact & get paper Ask from Whatsapp |
2019 |
705 | Research on Application Layer Security Communication Protocol Based on Lightweight NTRU Public Key Cryptography Read Abstact & get paper Ask from Whatsapp |
2019 |
706 | Secure Communications Method of WPT System Based on ECC and OFDM Technology Read Abstact & get paper Ask from Whatsapp |
2019 |
707 | Secure Random Phase Key Exchange Schemes for Image Cryptography Read Abstact & get paper Ask from Whatsapp |
2019 |
708 | Session-Key Establishment and Authentication in a Smart Home Network using Public Key Cryptography Read Abstact & get paper Ask from Whatsapp |
2018 |
709 | Symbolic methods in computational cryptography proofs Read Abstact & get paper Ask from Whatsapp |
2019 |
710 | Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks Read Abstact & get paper Ask from Whatsapp |
2020 |
711 | Visual Cryptography for colour images using multilevel thresholding Read Abstact & get paper Ask from Whatsapp |
2019 |
712 | VPQC: A Domain-Specific Vector Processor for Post-Quantum Cryptography Based on RISC-V Architecture Read Abstact & get paper Ask from Whatsapp |
2020 |
Sr no. | Topic Name | IEEE |