Search

Your search keyword '"DATA encryption"' showing total 656 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Topic computer communication networks Remove constraint Topic: computer communication networks Topic discrete mathematics in computer science Remove constraint Topic: discrete mathematics in computer science
656 results on '"DATA encryption"'

Search Results

1. Periodic Binary Sequences: Solved and Unsolved Problems.

2. On Attacks on Filtering Generators Using Linear Subspace Structures.

3. Randomness and Representation of Span n Sequences.

4. Existence of Modular Sonar Sequences of Twin-Prime Product Length.

5. Remarks on a Sequence of Minimal Niven Numbers.

6. The Linear Vector Space Spanned by the Nonlinear Filter Generator.

7. Shannon Capacity Limits of Wireless Networks.

8. Cyclotomic Mapping Permutation Polynomials over Finite Fields.

9. Some Mysterious Sequences Associated with LDPC Codes.

10. Single-Track Gray Codes and Sequences.

11. The Asymptotic Behavior of π-Adic Complexity with π2 = − 2.

12. Packing Centrosymmetric Patterns of n Nonattacking Queens on an n×n Board.

13. Sequences for Phase-Encoded Optical CDMA.

14. Double Periodic Arrays with Optimal Correlation for Applications in Watermarking.

15. Sequencings and Directed Graphs with Applications to Cryptography.

16. A New Family of Gold-Like Sequences.

17. On the Dual of Monomial Quadratic p-ary Bent Functions.

18. The Perfect Binary Sequence of Period 4 for Low Periodic and Aperiodic Autocorrelations.

19. Strongly Primitive Elements.

20. On Boolean Functions Which Are Bent and Negabent.

21. Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function.

22. Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware.

23. LFSR Based Stream Ciphers Are Vulnerable to Power Attacks.

24. Extended Multi-Property-Preserving and ECM-Construction.

25. Design of a Differential Power Analysis Resistant Masked AES S-Box.

26. An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions.

27. X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs.

28. On the k-Operation Linear Complexity of Periodic Sequences.

29. Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System.

30. Public Key Encryption with Searchable Keywords Based on Jacobi Symbols.

31. Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues.

32. A Framework for Chosen IV Statistical Analysis of Stream Ciphers.

33. Trade-Off Traitor Tracing.

34. New Description of SMS4 by an Embedding overGF(28).

35. A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power.

36. Solving Discrete Logarithms from Partial Knowledge of the Key.

37. Proxy Re-signature Schemes Without Random Oracles.

38. Tweakable Enciphering Schemes from Hash-Sum-Expansion.

39. Transitive Signatures from Braid Groups.

40. Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication.

41. First-Order Differential Power Analysis on the Duplication Method.

42. Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality.

43. New Formulae for Efficient Elliptic Curve Arithmetic.

44. A Graph Theoretic Analysis of Double Base Number Systems.

45. Improved Meet-in-the-Middle Attacks on Reduced-Round DES.

46. Related-Key Differential-Linear Attacks on Reduced AES-192.

47. On the Bits of Elliptic Curve Diffie-Hellman Keys.

48. Secret Swarm Unit Reactive k −Secret Sharing.

49. Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses.

50. A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography.

Catalog

Books, media, physical & digital resources