Search

Showing total 120 results

Search Constraints

Start Over You searched for: Topic ciphers Remove constraint Topic: ciphers Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years Database Supplemental Index Remove constraint Database: Supplemental Index
120 results

Search Results

1. A Method of Encoding Coordinates on the Paper for Digitizing Handwriting.

2. Building a Graphical Modelling Language for Efficient Homomorphic Encryption Schema Configuration: HomoLang.

3. A Dual Crypt-Stegano Approach for Information Security.

4. REVIEW OF AES METHODS AND SUGGESTED ABSTRACT CIPHERING FOR SECURED IMAGE DATA COMMUNICATION IN IOT AND AI APPLICATIONS.

5. Community oriented socio-behavioural PentaPlicative Cipher Technique.

6. A Steganography Method for G.729a Speech Coding.

7. Robust Method for Embedding an Image Inside Cover Image Based on Least Significant Bit Steganography.

8. An improved scheme for enhancing the ride-through capability of grid-connected photovoltaic systems towards meeting the recent grid codes requirements.

9. A chaos-based probabilistic block cipher for image encryption.

10. NÁVRATY SCHELLINGOVY SVOBODY U JASPERSE.

11. Flatness and structural analysis as a constructive framework for private communication.

12. Asymmetric Image Encryption Approach with Plaintext-Related Diffusion.

13. Towards Designing Efficient Lightweight Ciphers for Internet of Things.

14. Deep Learning Assisted Differential Cryptanalysis for the Lightweight Cipher SIMON.

15. Cryptanalysis of an Image Cipher using Multi-entropy Measures and the Countermeasures.

16. LWARX: Lightweight ARX white-box cipher for satellite communications.

17. IMAGE SUPER-RESOLUTION BASED ON SPARSE CODING WITH MULTI-CLASS DICTIONARIES.

18. Code Similarity Detection using AST and Textual Information.

19. IR-RBT Codes: A New Scheme of Regenerating Codes for Tolerating Node and Intra-node Failures in Distributed Storage Systems.

20. Efficient secret sharing scheme with cheater identification based on QR code.

21. Research on Sea Area Data Management Based on a Uniform Code Assignment Method.

22. New Quantum Codes From Matrix-Product Codes.

23. New Quantum BCH Codes of Length n=2(q4−1).

24. Tabu Search in revealing the internal state of RC4+ cipher.

25. The Direction of Lightweight Ciphers in Mobile Big Data Computing.

26. Slide attack on standard stream cipher Enocoro-80 in the related-key chosen IV setting.

27. Quaternion Feistel Cipher with an Infinite Key Space Based on Quaternion Julia Sets.

28. Hardware Efficient Parallel Substitution Box for Block Ciphers with Static and Dynamic Properties.

29. ON THE DINUCLEOTIDE CIRCULAR CODES OF MAXIMUM CARDINALITY.

30. A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments.

31. A New Cryptosystem of Color Image Using a Dynamic-Chaos Hill Cipher Algorithm.

32. Key generation for plain text in stream cipher via bi-objective evolutionary computing.

33. Secure Portable Virtual Private Network with Rabbit Stream Cipher Algorithm.

34. Unpredictable cryptographic primitives for the Robust Wireless Network Security.

35. DSL Development based on the Generic Syntax.

36. A Link Between Integrals and Higher-Order Integrals of SPN Ciphers.

37. Implementation Analysis of Matrix Power Cipher in Embedded Systems.

38. Efficient Masked Implementation for SEED Based on Combined Masking.

39. Implementation of Cryptographic Algorithms in Software: An Analysis of the Effectiveness.

40. Of Codes and Coda: Meaning in Telegraph Messages, circa 1850-1920.

41. A Research about Coole System Based on Special Garment.

42. Nonbinary single-symbol error correcting, adjacent two-symbol transposition error correcting codes over integer rings.

43. Authorship attribution of texts: a review.

44. Code Mixing as an Indicator of the Dominant Status of English.

45. Fully secure non-monotonic access structure CP-ABE scheme.

46. Fuzzy Keyword Search Method over Ciphertexts supporting Access Control.

47. Combining loop unrolling strategies and code predication to reduce the worst-case execution time of real-time software.

48. Security Enhancement of English Text using PRATHALA TABLE of ALPHANUMERALS.

49. Design and Implementation of Configurable SHIFT Instructions Targeted at Symmetrical Cipher Processing.

50. Locality of Some Optimal Ternary Linear Codes.