Search

Showing total 119 results

Search Constraints

Start Over You searched for: Topic ciphers Remove constraint Topic: ciphers Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years Database Supplemental Index Remove constraint Database: Supplemental Index
119 results

Search Results

1. A Method of Encoding Coordinates on the Paper for Digitizing Handwriting.

2. REVIEW OF AES METHODS AND SUGGESTED ABSTRACT CIPHERING FOR SECURED IMAGE DATA COMMUNICATION IN IOT AND AI APPLICATIONS.

3. A Dual Crypt-Stegano Approach for Information Security.

4. Community oriented socio-behavioural PentaPlicative Cipher Technique.

5. Robust Method for Embedding an Image Inside Cover Image Based on Least Significant Bit Steganography.

6. A Steganography Method for G.729a Speech Coding.

7. A chaos-based probabilistic block cipher for image encryption.

8. An improved scheme for enhancing the ride-through capability of grid-connected photovoltaic systems towards meeting the recent grid codes requirements.

9. NÁVRATY SCHELLINGOVY SVOBODY U JASPERSE.

10. LWARX: Lightweight ARX white-box cipher for satellite communications.

11. Flatness and structural analysis as a constructive framework for private communication.

12. Asymmetric Image Encryption Approach with Plaintext-Related Diffusion.

13. Deep Learning Assisted Differential Cryptanalysis for the Lightweight Cipher SIMON.

14. Towards Designing Efficient Lightweight Ciphers for Internet of Things.

15. Cryptanalysis of an Image Cipher using Multi-entropy Measures and the Countermeasures.

16. The Direction of Lightweight Ciphers in Mobile Big Data Computing.

17. Slide attack on standard stream cipher Enocoro-80 in the related-key chosen IV setting.

18. Quaternion Feistel Cipher with an Infinite Key Space Based on Quaternion Julia Sets.

19. IMAGE SUPER-RESOLUTION BASED ON SPARSE CODING WITH MULTI-CLASS DICTIONARIES.

20. Code Similarity Detection using AST and Textual Information.

21. IR-RBT Codes: A New Scheme of Regenerating Codes for Tolerating Node and Intra-node Failures in Distributed Storage Systems.

22. Efficient secret sharing scheme with cheater identification based on QR code.

23. Research on Sea Area Data Management Based on a Uniform Code Assignment Method.

24. New Quantum Codes From Matrix-Product Codes.

25. New Quantum BCH Codes of Length n=2(q4−1).

26. Tabu Search in revealing the internal state of RC4+ cipher.

27. A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments.

28. A New Cryptosystem of Color Image Using a Dynamic-Chaos Hill Cipher Algorithm.

29. Hardware Efficient Parallel Substitution Box for Block Ciphers with Static and Dynamic Properties.

30. ON THE DINUCLEOTIDE CIRCULAR CODES OF MAXIMUM CARDINALITY.

31. Key generation for plain text in stream cipher via bi-objective evolutionary computing.

32. Secure Portable Virtual Private Network with Rabbit Stream Cipher Algorithm.

33. Unpredictable cryptographic primitives for the Robust Wireless Network Security.

34. Fully secure non-monotonic access structure CP-ABE scheme.

35. A deep learning-based side channel attack model for different block ciphers.

36. DSL Development based on the Generic Syntax.

37. A Link Between Integrals and Higher-Order Integrals of SPN Ciphers.

38. Implementation Analysis of Matrix Power Cipher in Embedded Systems.

39. Efficient Masked Implementation for SEED Based on Combined Masking.

40. Implementation of Cryptographic Algorithms in Software: An Analysis of the Effectiveness.

41. Of Codes and Coda: Meaning in Telegraph Messages, circa 1850-1920.

42. A Research about Coole System Based on Special Garment.

43. Nonbinary single-symbol error correcting, adjacent two-symbol transposition error correcting codes over integer rings.

44. Authorship attribution of texts: a review.

45. Code Mixing as an Indicator of the Dominant Status of English.

46. Fuzzy Keyword Search Method over Ciphertexts supporting Access Control.

47. Combining loop unrolling strategies and code predication to reduce the worst-case execution time of real-time software.

48. Security Enhancement of English Text using PRATHALA TABLE of ALPHANUMERALS.

49. Design and Implementation of Configurable SHIFT Instructions Targeted at Symmetrical Cipher Processing.

50. Locality of Some Optimal Ternary Linear Codes.