Search

Your search keyword '"CRYPTOGRAPHY software"' showing total 84 results

Search Constraints

Start Over You searched for: Descriptor "CRYPTOGRAPHY software" Remove constraint Descriptor: "CRYPTOGRAPHY software" Search Limiters Full Text Remove constraint Search Limiters: Full Text
84 results on '"CRYPTOGRAPHY software"'

Search Results

1. The new crypto wars?

2. On the (Im)possibility of Obfuscating Programs.

3. An optical authentication system based on imaging of excitation-selected lanthanide luminescence.

4. Memristor based Random Number Generator: Architectures and Evaluation.

5. Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular Networks.

6. A New CPA Resistant Software Implementation for Symmetric Ciphers with Smoothed Power Consumption: SIMON Case Study.

7. Internet Banking Login with Multi-Factor Authentication.

8. Mission Assurance through Integrated Cyber Defense.

9. Differentially Private Frequent Sequence Mining.

10. Linear complexity of Whiteman's generalized cyclotomic sequences of order 2k.

11. Convolutional block codes with cryptographic properties over the semi-direct product $${\mathbb {Z}}/N{\mathbb {Z}} \rtimes {\mathbb {Z}}/M{\mathbb {Z}}$$.

12. Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension.

13. The Adaptation of Shamir's Approach for Increasing the Security of a Mobile Environment.

14. VIDEO STEGANOGRAPHY USING LEAST SIGNIFICANT BIT IN FREQUENCY DOMAIN.

15. Location-Based Security for Resource Management.

16. Secure and Efficient Architectures for Single Exponentiations in Finite Fields Suitable for High-Performance Cryptographic Applications.

17. Accelerating elliptic curve scalar multiplication over [formula omitted] on graphic hardwares.

18. Secure universal designated verifier identity-based signcryption.

19. A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks.

20. Research on Automatic Analysis of Security Protocols.

21. Secure Architecture for M-Learning Bluetooth Services.

22. Untraceable Mobile Node Authentication in WSN.

23. Revisiting Sum of Residues Modular Multiplication.

24. Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach.

25. A fast pipelined multi-mode DES architecture operating in IP representation

26. Password-Based Authentication: Preventing Dictionary Attacks.

27. ID-based threshold decryption secure against adaptive chosen-ciphertext attack

28. Proxy-protected signature secure against the undelegated proxy signature attack

29. Low-Weight Polynomial Form Integers for Efficient Modular Multiplication.

30. Cryptographic methods for collusion-secure fingerprinting of digital data.

31. Project #19 -- Enigma Cipher Machine.

32. Stegobot can steal passwords from your Facebook photos.

33. HIDING IN PLAIN SIGHT.

34. URL Pearls.

35. Crypography gets personal.

36. How secure is encrypted data?

37. Under lock and key.

38. US may relax rules on encryption.

39. Java Security Architecture and Extensions.

40. Key-Management Infrastructure for Protecting Stored Data.

41. The key to secure remote computing.

42. Navy Beefing Up At-Sea Enterprise Network.

43. Google researchers help developers test cryptographic implementations.

44. Heisenberg's certainty principle.

45. The quiet revolution.

46. SHA-1 hashing algorithm could succumb to $75K attack, researchers say.

47. CryptoWall ransomware is back with new version after two months of silence.

48. Crypto export laws loosened.

49. Secret plans.

50. Don't tell it to the Spartans (nor, indeed, to anyone else).

Catalog

Books, media, physical & digital resources