Search

Your search keyword '"CRYPTOGRAPHY research"' showing total 476 results

Search Constraints

Start Over You searched for: Descriptor "CRYPTOGRAPHY research" Remove constraint Descriptor: "CRYPTOGRAPHY research"
476 results on '"CRYPTOGRAPHY research"'

Search Results

151. MĂRUNŢIŞURI CRIPTOGRAFICE.

152. МЕТОДИ ПІДВИЩЕННЯ СТІЙКОСТІ СТЕГАНОСИСТЕМ ДО НЕСАНКЦІОНОВАНОГО ДОСТУПУ

153. АНАЛІЗ ЧАСОВИХ АТАК НА АПАРАТНИЙ ШИФРАТОР ПЕРСОНАЛЬНОГО ЗАСОБУ КРИПТОГРАФІЧНОГО ЗАХИСТУ ІНФОРМАЦІЇ ШИПКА

154. ELLIPTIC CURVE CRYPTOGRAPHY.

155. Tampering Detection in Compressed Digital Video Using Watermarking.

156. Principles and overview of network steganography.

157. Advancing the Technology of Network Security by using Latest Cryptographic Schemes and Software Developments.

158. Error Detection and Recovery for ECC: A New Approach Against Side-Channel Attacks.

159. Secure Message Transmission With Small Public Discussion.

160. Applications of SAT Solvers in Cryptanalysis: Finding Weak Keys and Preimages.

161. On the Nonlinearity and Correlation Immunity of Two Classes of Boolean Functions.

162. Functioning of the state secrets security system in Ukraine: organizational and legal structure, principles and objectives.

163. Substitution cipher based on pseudo non-determined gamma generator.

164. The synthesis of nonlinear operations for cryptographic transformation.

165. Bound on the Key Establishment Rate for Multi-Antenna Reciprocal Electromagnetic Channels.

166. Nonsignaling quantum random access-code boxes.

167. Using RC4 and AES Key Schedule to Generate Dynamic S-Box in AES.

168. Towards a cryptographic treatment of publish/subscribe systems.

169. Quantitative steganalysis of least significant bit matching revisited for consecutive pixels.

170. Improving the Quality of Delay-Based PUFs via Optical Proximity Correction.

171. Privacy-aware event data recorders: cryptography meets the automotive industry again.

172. Verified indifferentiable hashing into elliptic curves.

173. Type-based analysis of key management in PKCS#11 cryptographic devices.

174. MULTI-DOMAIN ACCESS CONTROL POLICY IN WIRELESS CLASSIFIED ENVIRONMENTS USING STEGANOGRAPHY.

175. SOFTVERSKI SISTEM ZA VIZUELNU REPREZENTACIJU KLASIČNIH KRIPTOGRAFSKIH ALGORITAMA.

176. Sparc64 X: Fujitsu's New-Generation 16-Core Processor for Unix Servers.

177. A new frequency-hopping sequence set based upon generalized cyclotomy.

178. Additive semisimple multivariable codes over $${\mathbb{F}_4}$$.

179. Gauss periods and codebooks from generalized cyclotomic sets of order four.

180. A remark on symplectic semifield planes and Z-linear codes.

181. New optimal [52, 26, 10] self-dual codes.

182. GBRDs over supersolvable groups and solvable groups of order prime to 3.

183. New results on variants of covering codes in Sierpiński graphs.

184. Security Enhancement through Fine Grained Access Control in Cloud Computing.

185. PSEUDORANDOM GENERATORS WITH LONG STRETCH AND LOW LOCALITY FROM RANDOM LOCAL ONE-WAY FUNCTIONS.

186. Black-box construction of a more than non-malleable CCA1 encryption scheme from plaintext awareness.

187. High-capacity method for hiding data in the discrete cosine transform domain.

188. Steganalysis of JPEG images using block texture-based rich models.

189. Adaptive image steganography using contourlet transform.

190. A TECHNIQUE TO ESTIMATE A STEGANOGRAPHIC CAPACITY OF A STEGO CHANNEL FORMED WITH LSB MODIFICATION APPROACH.

191. Whittingham-Collingwood Cipher Machine.

192. A First-Year Seminar on Cryptography.

193. Instances of Arabic Cryptography in Morocco II.

194. Atbah-Type Ciphers in the Christian Orient and Numerical Rules in the Construction of Christian Substitution Ciphers.

195. Research on payload adaptive batch steganography.

196. Architectures of Flexible Symmetric Key Crypto Engines-A Survey: From Hardware Coprocessor to Multi-Crypto-Processor System on Chip.

197. Improving the security of arbitrated quantum signature against the forgery attack.

198. SCIENTOMETRIC ANALYSIS OF CRYPTOGRAPHY RESEARCH OUTPUT.

199. Identity-based optimistic fair exchange in the standard model.

200. Cipher feedback mode under go-back-N and selective-reject protocols in error channels.

Catalog

Books, media, physical & digital resources