30 results on '"Khudoykulov, Zarif"'
Search Results
2. A Comparison of Lightweight Cryptographic Algorithms
3. Classification of Threats to Information Security of the 'Smart Home' System
4. Comparative analysis of electronic voting methods based on blockchain technology
5. Energy-efficient implementation of BCD to Excess-3 code converter for nanocommunication using QCA technology
6. Integral cryptanalysis: a new key determination technique for 3-phase Kuznyechik encryption
7. Authentication in Cloud Computing: Open Problems
8. A NEW KEY STREAM ENCRYPTION ALGORITHM AND ITS CRYPTANALYSIS
9. Energy-efficient implementation of BCD to Excess-3 code converter for nano-communication using QCA technology
10. Application of the algebraic cryptanalysis method to the Kuznyechik encryption algorithm
11. Blockchain Based E-Voting System: Open Issues and Challenges
12. Analysis Password-based Authentication Systems with Password Policy
13. Lightweight Cryptography Algorithms for IoT Devices: Open issues and challenges
14. Conversion of the Diffie-Hellman Key Exchange Algorithm Based on Elliptic Curve Equations to Elliptic Curve Equations with Private Parameters
15. Differential Collisions in SHA-1
16. Algebraic Cryptanalysis of O'zDSt 1105:2009 Encryption Algorithm
17. A Method of Efficient OTP Generation Using Pseudorandom Number Generators
18. Analysis of algebraic properties of transformation of O’zDSt 1105:2009 algorithm
19. Analysis of Security Protocols in Wireless Sensor Networks
20. A Method of Efficient OTP Generation Using Pseudorandom Number Generators
21. Analysis of algebraic properties of transformation of O’zDSt 1105:2009 algorithm
22. Analysis of Security Protocols in Wireless Sensor Networks
23. Computer's source based (Pseudo) random number generation
24. Comparative factors of key generation techniques
25. Computer's source based (Pseudo) random number generation
26. Comparative factors of key generation techniques
27. Biometric cryptosystems: Open issues and challenges
28. Binarization Based Minutiae Extraction.
29. A PRACTICAL IMPLEMENTATION OF FINGERPRINT BASED FUZZY COMMITMENT SCHEME.
30. Biometric Cryptosystem Security Threats.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.