Search

Your search keyword '"CRYPTOGRAPHY research"' showing total 170 results

Search Constraints

Start Over You searched for: Descriptor "CRYPTOGRAPHY research" Remove constraint Descriptor: "CRYPTOGRAPHY research" Database Academic Search Index Remove constraint Database: Academic Search Index
170 results on '"CRYPTOGRAPHY research"'

Search Results

1. Cybersecurity in India.

2. How to Compute an Isogeny on the Extended Jacobi Quartic Curves?

3. Neuroscience Meets Cryptography: Crypto Primitives Secure Against Rubber Hose Attacks.

4. Frontmatter.

5. acm forum.

6. Proofs Probable.

7. Cracking the Code.

8. Efficient and secure attribute-based signature for monotone predicates.

9. The future of cybersecurity is quantum.

10. Chaum's protocol for detecting man-in-the-middle: Explanation, demonstration, and timing studies for a text-messaging scenario.

11. Rapid data exchange helps keep a secret for 24 hours.

12. A symmetric key-based pre-authentication protocol for secure handover in mobile WiMAX networks.

13. Another look at normal approximations in cryptanalysis.

14. Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier.

15. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage.

16. Quantum Private Query Protocol Based on Two Non-Orthogonal States.

17. Random-Resistor-Random-Temperature Kirchhoff-Law-Johnson-Noise (RRRT-KLJN) Key Exchange.

18. IDENTITY-BASED CHRYPTOGRAPHY: FROM PROPOSALS TO EVERYDAY USE.

19. BUILDING A HYBRID SECURE SOCKET LAYER PROTOCOL.

20. DATU DROŠĪBA UN KRIPTOGRĀFIJA.

21. ACM Member News.

22. Implementation Theoretical Information Protocol for Public Distribution Cryptology Keys.

23. History and Modern Cryptanalysis of Enigma's Pluggable Reflector.

24. Automated Known-Plaintext Cryptanalysis of Short Hagelin M-209 Messages.

25. CONSTRUCTING OF MINIMAX CLASS OF PERFECT BINARY ARRAYS OF ORDER N = 6 FOR MULTI-CHANNEL CRYPTOGRAPHIC INFORMATION TRANSFER SYSTEM.

26. Design and Development of Layered Security: Future Enhancements and Directions in Transmission.

27. Lattice approach to video steganography.

28. Hidden message in a deformation-based texture.

29. Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs.

30. Cryptanalysis of an "asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition".

31. High-Performance Two-Dimensional Finite Field Multiplication and Exponentiation for Cryptographic Applications.

32. PROGRAM AND TECHNICAL ASPECTS OF CRYPTOGRAPHIC DEFENCE OF DATA STORAGE.

33. SECURE IMAGE STEGANOGRAPHY USING CRYPTOGRAPHY AND IMAGE TRANSPOSITION.

34. A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks.

35. The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks.

36. A Hardware-Based Countermeasure to Reduce Side-Channel Leakage: Design, Implementation, and Evaluation.

37. FPGA Trojans Through Detecting and Weakening of Cryptographic Primitives.

38. Brandt's fully private auction protocol revisited.

39. Extending Feistel structure to DNA Cryptography.

40. Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curves.

41. Kaczynski's Ciphers.

42. Efficient Pairing Computation on Huff Curves.

43. A Secure Reconfigurable Crypto IC With Countermeasures Against SPA, DPA, and EMA.

44. Trade-Offs for Threshold Implementations Illustrated on AES.

45. Provably sender-deniable encryption scheme.

46. ON SECRET SHARING WITH NONLINEAR PRODUCT RECONSTRUCTION.

47. A Robust Trust Establishment Scheme for Wireless Sensor Networks.

48. Cryptanalysis of a modified encryption scheme based on bent Boolean function and feedback with carry shift register.

49. A method to decrease computation time for fourth order Lucas sequence.

50. QUANTITATIVE EVALUATION OF IDENTITY BASED CRYPTOGRAPHY IN AN AUTHENTICATION SCENARIO.

Catalog

Books, media, physical & digital resources