Search

Your search keyword '"*CRYPTOGRAPHY software"' showing total 154 results

Search Constraints

Start Over You searched for: Descriptor "*CRYPTOGRAPHY software" Remove constraint Descriptor: "*CRYPTOGRAPHY software"
154 results on '"*CRYPTOGRAPHY software"'

Search Results

1. The new crypto wars?

2. On the (Im)possibility of Obfuscating Programs.

3. Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers.

4. Hybrid Cryptography Algorithm with Precomputation for Advanced Metering Infrastructure Networks.

5. A white-box AES-like implementation based on key-dependent substitution-linear transformations.

6. An AMR adaptive steganography algorithm based on minimizing distortion.

7. An optical authentication system based on imaging of excitation-selected lanthanide luminescence.

9. Memristor based Random Number Generator: Architectures and Evaluation.

10. A simulation study on the accuracy of cryptographic randomness tests.

11. Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular Networks.

12. RTN in Scaled Transistors for On-Chip Random Seed Generation.

13. STUDY OF LATTICE BASED FHE FOR CLOUD DATA SECURITY.

14. A REVIEW: ENHANCED STEGANOGRAPHY TECHNIQUE FOR 2D BARCODE IMAGES.

15. A New CPA Resistant Software Implementation for Symmetric Ciphers with Smoothed Power Consumption: SIMON Case Study.

16. Cryptographic Architectures: MISSING IN ACTION.

17. A Hybrid Approach for Path Vulnerability Matrix on Random Key Predistribution for Wireless Sensor Networks.

18. Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection.

19. Internet Banking Login with Multi-Factor Authentication.

20. A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem.

21. Mission Assurance through Integrated Cyber Defense.

22. Differentially Private Frequent Sequence Mining.

23. Linear complexity of Whiteman's generalized cyclotomic sequences of order 2k.

24. Convolutional block codes with cryptographic properties over the semi-direct product $${\mathbb {Z}}/N{\mathbb {Z}} \rtimes {\mathbb {Z}}/M{\mathbb {Z}}$$.

25. Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension.

26. Beat Frequency Detector–Based High-Speed True Random Number Generators: Statistical Modeling and Analysis.

27. VIDEO STEGANOGRAPHY USING LEAST SIGNIFICANT BIT IN FREQUENCY DOMAIN.

28. The Adaptation of Shamir's Approach for Increasing the Security of a Mobile Environment.

29. Secure Communications via Physical-Layer and Information-Theoretic Techniques [Scanning the Issue].

30. Location-Based Security for Resource Management.

31. SKENO: Secret key encryption with non-interactive opening.

32. Secure and Efficient Architectures for Single Exponentiations in Finite Fields Suitable for High-Performance Cryptographic Applications.

33. Accelerating elliptic curve scalar multiplication over [formula omitted] on graphic hardwares.

34. On the insecurity of XML Security.

35. Using Soft Systems Methodology and Activity Theory to Exploit Security of Web Applications against Heartbleed Vulnerability.

36. A method to decrease computation time for fourth order Lucas sequence.

37. Construction of a New Cryptographic Method, Employing Pseudoanalytic Function Theory.

38. A Simple and Efficient Way to Combine Microcontrollers with RSA Cryptography.

39. Secure universal designated verifier identity-based signcryption.

40. A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks.

41. Watermarking digital vector map using graph theoretic approach.

42. Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer.

43. A dynamic TDMA based scheme for securing query processing in WSN.

44. Side-channel attacks on HIGHT with reduced masked rounds suitable for the protection of multimedia computing system.

45. Research on Automatic Analysis of Security Protocols.

46. Policy Management for Secure Data Access Control in Vehicular Networks.

47. Secure Architecture for M-Learning Bluetooth Services.

48. Untraceable Mobile Node Authentication in WSN.

49. Revisiting Sum of Residues Modular Multiplication.

50. The MPEG Open Access Application Format.

Catalog

Books, media, physical & digital resources