Search

Showing total 4,158 results
4,158 results

Search Results

1. Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis.

2. ACM Honors Work by NTT Research Cryptographer with Best Paper Award

3. NTT Research and NTT to Present 17 Papers at Eurocrypt 2023

9. A review paper: Text-to-image cryptography in color coding.

10. Ensuring Secure and Tamper Resistant Election with Blockchain Powered Online Voting.

11. Research on Digital Steganography and Image Synthesis Model Based on Improved Wavelet Neural Network.

12. Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021).

13. Parallel Search Using Probabilistic DNA Sticker Model to Cryptanyze One Time Pad Polyalphabetic Cipher.

15. Efficiency of LSB steganography on medical information.

18. AUDIO ENCRYPTION AND DECRYPTION USING AES ALGORITHM TECHNIQUE.

19. Errorless robust JPEG steganography using steganographic polar codes.

20. Adventures in Cryptology: Exploration-Worthy Project Topics.

21. AN EFFICIENT ALGORITHM FOR INTEGER LATTICE REDUCTION.

22. E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval.

23. New Variations of Discrete Logarithm Problem.

24. History, decoded.

25. Machine Learning and Applied Cryptography.

26. BLE-based secure tracking system proposal.

27. Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular Networks.

28. On a class of permutation trinomials over finite fields.

29. Enhancing Security with Multi-level Steganography: A Dynamic Least Significant Bit and Wavelet-Based Approach.

30. Comparative analysis between a pixel-wise image encryption scheme and AES in a web application context.

31. Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography.

32. Survey of research on confidential computing.

33. A Secure Architecture to Protect the Network from Replay Attacks during Client-to-Client Data Transmission.

34. A Post-Quantum Cross-Domain Authentication Scheme Based on Multi-Chain Architecture.

35. Introduction to the Special Issue: Resources for Undergraduate Cryptology.

36. An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault.

37. SECURITY FEATURES ON AND WITH DOCUMENTS: A SURVEY.

38. An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms.

39. A STUDY AND COMPARISON OF THE VARIOUS CRYPTOGRAPHY TECHNIQUE STANDARDS WITHIN FIFTEEN FACTORS.

40. DIGITAL CURRENCY: A CONCEPTUAL FRAMEWORK OF PERFORMANCE.

41. Mixture Differential Cryptanalysis on Round-Reduced SIMON32/64 Using Machine Learning.

42. Information Theory, Living Systems, and Communication Engineering.

43. Motion vector‐domain video steganalysis exploiting skipped macroblocks.

44. Secure encryption over the ring F2 + uF2 + vF2 + uvF2.

45. DieRoll: A Unique Key Generation and Encryption Technique.

46. Modified Symmetric Image Encryption Approach Based on Mixed Column and Substitution Box.

47. IoT Security for D-App in Supply Chain Management.

48. Reversible Logic Gates and Applications - A Low Power Solution to VLSI Chips.

49. Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks.

50. Possibility of land ownership transaction with non-fungible token technology: Minting survey plan.