Search

Showing total 596 results

Search Constraints

Start Over You searched for: Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Topic cryptography Remove constraint Topic: cryptography Language english Remove constraint Language: english Publisher world scientific publishing company Remove constraint Publisher: world scientific publishing company
596 results

Search Results

1. The Prospects of Quantum Secure Direct Communication: An Overview.

2. Pseudo-random number generation based on spatial chaotic map of Logistic type and its cryptographic application.

3. High Embedding Capacity Color Image Steganography Scheme Using Pixel Value Differencing and Addressing the Falling-Off Boundary Problem.

4. Minimal codewords: An application of relative four-weight codes.

5. Hardware Efficient Pseudo-Random Number Generator Using Chen Chaotic System on FPGA.

6. Cryptanalysis of a Multiround Image Encryption Algorithm Based on 6D Self-Synchronizing Chaotic Stream Cipher.

7. A New True Random Number Generator Based on Differential Variable Ring Oscillator Robust Against PVT Variation.

8. On matrix sequences represented by negative indices Pell and Pell–Lucas number with the decoding of Lucas blocking error correcting codes.

9. A New 4D Chaos System with an Encryption Algorithm for Color and Grayscale Images.

10. Triple-Coupling Cellular Automata and Their Application to Image Encryption.

11. A Chaotic Image Encryption Scheme Based on Genetic Central Dogma and KMP Method.

12. Reconfigurable Image Confusion Scheme Using Large Period Pseudorandom Bit Generator Based on Coupled-Variable Input LCG and Clock Divider.

13. Design of a Low-Power Cryptographic Accelerator Under Advanced Encryption Standard.

14. Identification of ECA rules forming MACA in periodic boundary condition.

15. Some Special Perfect c-Nonlinear Functions on ℤn.

16. SPANSE: Combining sparsity with density for efficient one-time code-based digital signatures.

17. DSIT: A Dynamic Lightweight Cryptography Algorithm for Securing Image in IoT Communication.

18. Secret Key-Based Image Steganography in Spatial Domain.

19. A Steganography Embedding Method Based on Hamming Coding and Histogram-Preserving.

20. Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique.

21. New encryption scheme using k-Fibonacci-like sequence.

22. A Novel Memristor-Based Multi-Vortex Hyper-Chaotic Circuit Design and its Application in Image Encryption.

23. High-Performance Hardware Implementation of the KATAN Lightweight Cryptographic Cipher.

24. Cryptanalysis of He's quantum private comparison protocol and a new protocol.

25. Design and Implementation of a Lattice-Based Public-Key Encryption Scheme.

26. Fuzzy Perspective of Online Games by Using Cryptography and Cooperative Game Theory.

27. A Novel Steganography Algorithm Based on Quantization Table Modification and Image Scrambling in DCT Domain.

28. Cryptanalysis of Chaos-Based Cryptosystem from the Hardware Perspective.

29. Fractional Order Spatiotemporal Chaos with Delay in Spatial Nonlinear Coupling.

30. A New 3D Discrete Hyperchaotic System and Its Application in Secure Transmission.

31. On the primitivity of the AES-128 key-schedule.

32. Beta Products of Fuzzy Graphs with Application in Cryptography.

33. A NOVEL QUANTUM STEGANOGRAPHY PROTOCOL BASED ON PROBABILITY MEASUREMENTS.

34. A FIRST CRYPTOSYSTEM FOR SECURITY OF TWO-DIMENSIONAL DATA.

35. Evolvable Hardware-Based Data Security System Using Image Steganography Through Dynamic Partial Reconfiguration.

36. A Sensitive Image Encryption Algorithm Based on a Higher-Dimensional Chaotic Map and Steganography.

37. Cryptanalysis and Improvement of a Color Image Encryption Scheme Based on DNA Sequences and Multiple 1D Chaotic Maps.

38. Redundant-Signed-Digit-Based High Speed Elliptic Curve Cryptographic Processor.

39. An Analysis of Digraphs and Period Properties of the Logistic Map on Z(pn).

40. Flexible Architectures for Cryptographic Algorithms — A Systematic Literature Review.

41. ON GUESS AND DETERMINE ANALYSIS OF RABBIT.

42. Low Power High Speed MISTY1 Cryptography Approaches.

43. Implementation of Symmetric Functions Using Memristive Nanocrossbar Arrays and their Application in Cryptography.

44. Representation of integers by k-generalized Fibonacci sequences and applications in cryptography.

45. Cryptanalysis of Some Self-Synchronous Chaotic Stream Ciphers and Their Improved Schemes.

46. Chaos-based Video Steganography Method in Discrete Cosine Transform Domain.

47. Optimal Cryptography Scheme and Efficient Neutrosophic C-Means Clustering for Anomaly Detection in Cloud Environment.

48. On some properties of single power cyclic hypergroups and regular relations.

49. PREFACE.

50. SECURITY ANALYSIS OF A FUZZY IDENTITY-BASED ENCRYPTION SCHEME.