Search

Your search keyword '"CRYPTOGRAPHY research"' showing total 476 results

Search Constraints

Start Over You searched for: Descriptor "CRYPTOGRAPHY research" Remove constraint Descriptor: "CRYPTOGRAPHY research"
476 results on '"CRYPTOGRAPHY research"'

Search Results

1. Cybersecurity in India.

2. How to Compute an Isogeny on the Extended Jacobi Quartic Curves?

3. Constant-Round Nonmalleable Commitments from Any One-Way Function.

4. Privacy Amplification with Asymptotically Optimal Entropy Loss.

5. Nearly Optimal Solutions for the Chow Parameters Problem and Low-Weight Approximation of Halfspaces.

6. New Techniques for Noninteractive Zero-Knowledge.

7. Neuroscience Meets Cryptography: Crypto Primitives Secure Against Rubber Hose Attacks.

8. Frontmatter.

9. Visual cryptograms of random grids via linear algebra.

10. acm forum.

11. Proofs Probable.

12. Cracking the Code.

13. A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition.

14. Efficient and secure attribute-based signature for monotone predicates.

15. A Flexible Fully Homomorphic Encryption.

16. On The Study of EEG-based Cryptographic Key Generation.

17. The future of cybersecurity is quantum.

18. Chaum's protocol for detecting man-in-the-middle: Explanation, demonstration, and timing studies for a text-messaging scenario.

19. Rapid data exchange helps keep a secret for 24 hours.

20. An Improved Level of Security for DNA Steganography Using Hyperelliptic Curve Cryptography.

21. AD-ASGKA - authenticated dynamic protocols for asymmetric group key agreement.

22. Cryptanalysis of a certificateless aggregate signature scheme.

23. Efficient chosen ciphertext secure identity-based encryption against key leakage attacks.

24. User-friendly random-grid-based visual secret sharing for general access structures.

25. A secure white-box SM4 implementation.

26. Tweakable parallel OFB mode of operation with delayed thread synchronization.

27. Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage.

28. A survey of lightweight stream ciphers for embedded systems.

29. A symmetric key-based pre-authentication protocol for secure handover in mobile WiMAX networks.

30. Another look at normal approximations in cryptanalysis.

31. Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier.

32. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage.

33. Quantum Private Query Protocol Based on Two Non-Orthogonal States.

34. Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography.

35. MODELLING OF HAZARDS EFFECT ON SAFETY INTEGRITY OF OPEN TRANSMISSION SYSTEMS.

36. An All-Digital Edge Racing True Random Number Generator Robust Against PVT Variations.

37. Limits on the Usefulness of Random Oracles.

38. Distance Based Leakage Alignment for Side Channel Attacks.

39. Random-Resistor-Random-Temperature Kirchhoff-Law-Johnson-Noise (RRRT-KLJN) Key Exchange.

40. Pure spatial rich model features for digital image steganalysis.

41. IDENTITY-BASED CHRYPTOGRAPHY: FROM PROPOSALS TO EVERYDAY USE.

42. BUILDING A HYBRID SECURE SOCKET LAYER PROTOCOL.

43. DATU DROŠĪBA UN KRIPTOGRĀFIJA.

44. ACM Member News.

45. Implementation Theoretical Information Protocol for Public Distribution Cryptology Keys.

46. Anonymous communication in overlay networks.

47. Selectively chosen ciphertext security in threshold public-key encryption.

48. Biclique cryptanalysis of MIBS-80 and PRESENT-80 block ciphers.

49. Cryptanalysis of a robust key agreement based on public key authentication.

50. History and Modern Cryptanalysis of Enigma's Pluggable Reflector.

Catalog

Books, media, physical & digital resources