Search

Your search keyword '"CRYPTOGRAPHY"' showing total 9,787 results

Search Constraints

Start Over You searched for: Descriptor "CRYPTOGRAPHY" Remove constraint Descriptor: "CRYPTOGRAPHY"
9,787 results on '"CRYPTOGRAPHY"'

Search Results

1. A multi-party verifiable quantum proxy signature scheme based on quantum teleportation.

2. An Act of Self-indulgence? The Yamamoto Mission after Eighty Years.

3. Quantum-Proof Secrets.

4. Stochastic generation in a Josephson-like antiferromagnetic spin Hall oscillator driven by a pure AC current.

5. An investigation the labeling of graph C[(4,12),(3,n),2]-cycle books.

6. History, decoded.

7. Comparative analysis between a pixel-wise image encryption scheme and AES in a web application context.

8. Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things.

9. State Department cipher machines and communications security in the early Cold War, 1944–1965.

10. Orbit design of satellite quantum key distribution constellations in different ground stations networks.

11. Symmetric Encryption Algorithms in a Polynomial Residue Number System.

12. Design and implementation in an Altera's cyclone IV EP4CE6E22C8 FPGA board of a fast and robust cipher using combined 1D maps.

13. An optimal multipath routing protocol using hybrid gravitational search particle swarm optimization for secure communication.

14. Multi‐Wavelength Metasurface Empowered Cryptography for Heightened Security and Improved Fidelity.

15. Verifiable secret sharing with changeable access structure.

16. NDNOTA: NDN One-Time Authentication.

17. Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.

18. Novel, Fast, Strong, and Parallel: A Colored Image Cipher Based on SBTM CPRNG.

19. Domain Transformation of Distortion Costs for Efficient JPEG Steganography with Symmetric Embedding.

20. Global Generalized Mersenne Numbers: Definition, Decomposition, and Generalized Theorems.

21. Information Theory, Living Systems, and Communication Engineering.

22. eAOM: Extended agent‐oriented modeling as an alternative methodology for blockchain enabling application development.

23. Privacy‐preserving in the smart healthcare system using steganography and chaotic functions based on DNA.

24. Chaos based Medical Image Encryption Techniques: A Comprehensive Review and Analysis.

25. Certificateless directed signature scheme without bilinear pairing.

26. Area and Power Efficient AVLS-TSPC-Based Diffused Bit Generator for Key Generation.

27. Enhance Security and Privacy in VANET Based Sensor Monitoring and Emergency Services.

28. One-key based cryptographically generated address for location update in next generation IP mobility.

29. Secure encryption over the ring F2 + uF2 + vF2 + uvF2.

30. WIN-WIN ENVIRONMENTAL REGULATIONS FOR CRYPTO MINING: DEVELOPING A REGULATORY PROGRAM THAT REDUCES ENVIRONMENTAL HARM AND PROMOTES INNOVATION AND COMPETITION.

31. Edge detection steganography and quantum circuit design based on a novel fractal chaotic system.

32. Concrete quantum cryptanalysis of binary elliptic curves via addition chain.

33. Asymmetric Cryptography Based on the Tropical Jones Matrix.

34. Security Analysis of the Symmetric Cryptosystem TinyJambu.

35. Novel true random bit generation and its audio encryption application with Lorenz chaotic circuit-based entropy source.

36. A combination of hill cipher and RC4 methods for text security.

37. Motion vector‐domain video steganalysis exploiting skipped macroblocks.

38. A Novel Memristor-Based Multi-Vortex Hyper-Chaotic Circuit Design and its Application in Image Encryption.

39. De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem.

40. Enhancing Multimedia Security Using Shortest Weight First Algorithm and Symmetric Cryptography.

41. Modified Symmetric Image Encryption Approach Based on Mixed Column and Substitution Box.

42. DieRoll: A Unique Key Generation and Encryption Technique.

43. A blockchain-based secure system for cloud storage.

44. Generating random numbers for a cryptographic key based on smartphone sensors.

45. A review of steganography techniques.

46. New design of NTRU key using QKD variants.

47. A reliable hybrid cryptosystem for colour image encryption.

48. Reduced plaintext for ciphers (RPC) algorithm.

49. A new secure mapping scheme on elliptic curve cryptography for internet of things.

50. Visual cryptography For(3,3) color scheme.

Catalog

Books, media, physical & digital resources