![Design of a cryptographically secure pseudo random number generator with grammatical evolution | Scientific Reports Design of a cryptographically secure pseudo random number generator with grammatical evolution | Scientific Reports](https://media.springernature.com/full/springer-static/image/art%3A10.1038%2Fs41598-022-11613-x/MediaObjects/41598_2022_11613_Fig1_HTML.png)
Design of a cryptographically secure pseudo random number generator with grammatical evolution | Scientific Reports
![Electronics | Free Full-Text | A Secure Personal Health Record Sharing System with Key Aggregate Dynamic Searchable Encryption Electronics | Free Full-Text | A Secure Personal Health Record Sharing System with Key Aggregate Dynamic Searchable Encryption](https://www.mdpi.com/electronics/electronics-11-03199/article_deploy/html/images/electronics-11-03199-g001.png)
Electronics | Free Full-Text | A Secure Personal Health Record Sharing System with Key Aggregate Dynamic Searchable Encryption
![Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains | SpringerLink Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains | SpringerLink](https://media.springernature.com/lw685/springer-static/image/art%3A10.1007%2Fs10207-022-00588-5/MediaObjects/10207_2022_588_Fig2_HTML.png)
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains | SpringerLink
![Cryptography | Free Full-Text | ES-HAS: ECC-Based Secure Handover Authentication Scheme for Roaming Mobile User in Global Mobility Networks Cryptography | Free Full-Text | ES-HAS: ECC-Based Secure Handover Authentication Scheme for Roaming Mobile User in Global Mobility Networks](https://www.mdpi.com/cryptography/cryptography-05-00035/article_deploy/html/images/cryptography-05-00035-g001.png)
Cryptography | Free Full-Text | ES-HAS: ECC-Based Secure Handover Authentication Scheme for Roaming Mobile User in Global Mobility Networks
![An efficient multilevel security architecture for blockchain-based IoT networks using principles of cellular automata [PeerJ] An efficient multilevel security architecture for blockchain-based IoT networks using principles of cellular automata [PeerJ]](https://dfzljdn9uc3pi.cloudfront.net/2022/cs-989/1/fig-2-full.png)
An efficient multilevel security architecture for blockchain-based IoT networks using principles of cellular automata [PeerJ]
![Sustainability | Free Full-Text | Quantum Key Distribution Protocol Selector Based on Machine Learning for Next-Generation Networks Sustainability | Free Full-Text | Quantum Key Distribution Protocol Selector Based on Machine Learning for Next-Generation Networks](https://pub.mdpi-res.com/sustainability/sustainability-14-15901/article_deploy/html/images/sustainability-14-15901-g001.png?1669723430)
Sustainability | Free Full-Text | Quantum Key Distribution Protocol Selector Based on Machine Learning for Next-Generation Networks
![PDF] A New Cryptographic Hash Function Based on Cellular Automata Rules 30 , 134 and Omega-Flip Network | Semantic Scholar PDF] A New Cryptographic Hash Function Based on Cellular Automata Rules 30 , 134 and Omega-Flip Network | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/1563c58daf7a9f63784ee19a98aeb529b7eb66bb/5-Table2-1.png)