Search

Showing total 602 results

Search Constraints

Start Over You searched for: Topic cryptography Remove constraint Topic: cryptography Language english Remove constraint Language: english Publisher world scientific publishing company Remove constraint Publisher: world scientific publishing company
602 results

Search Results

1. The Prospects of Quantum Secure Direct Communication: An Overview.

2. Pseudo-random number generation based on spatial chaotic map of Logistic type and its cryptographic application.

3. Minimal codewords: An application of relative four-weight codes.

4. High Embedding Capacity Color Image Steganography Scheme Using Pixel Value Differencing and Addressing the Falling-Off Boundary Problem.

5. Hardware Efficient Pseudo-Random Number Generator Using Chen Chaotic System on FPGA.

6. Cryptanalysis of a Multiround Image Encryption Algorithm Based on 6D Self-Synchronizing Chaotic Stream Cipher.

7. A New True Random Number Generator Based on Differential Variable Ring Oscillator Robust Against PVT Variation.

8. A New 4D Chaos System with an Encryption Algorithm for Color and Grayscale Images.

9. Visual aspects of Gaussian periods and analogues.

10. Cryptanalyzing an Image Encryption Scheme Using Synchronization of Memristor Chaotic Systems.

11. Reconfigurable Image Confusion Scheme Using Large Period Pseudorandom Bit Generator Based on Coupled-Variable Input LCG and Clock Divider.

12. Triple-Coupling Cellular Automata and Their Application to Image Encryption.

13. A Chaotic Image Encryption Scheme Based on Genetic Central Dogma and KMP Method.

14. On matrix sequences represented by negative indices Pell and Pell–Lucas number with the decoding of Lucas blocking error correcting codes.

15. A Federated Learning Protocol for Spiking Neural Membrane Systems.

16. A Steganography Embedding Method Based on Hamming Coding and Histogram-Preserving.

17. Secret Key-Based Image Steganography in Spatial Domain.

18. New encryption scheme using k-Fibonacci-like sequence.

19. Design of a Low-Power Cryptographic Accelerator Under Advanced Encryption Standard.

20. Identification of ECA rules forming MACA in periodic boundary condition.

21. Some Special Perfect c-Nonlinear Functions on ℤn.

22. SPANSE: Combining sparsity with density for efficient one-time code-based digital signatures.

23. DSIT: A Dynamic Lightweight Cryptography Algorithm for Securing Image in IoT Communication.

24. Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique.

25. Cryptanalysis of He's quantum private comparison protocol and a new protocol.

26. Design and Implementation of a Lattice-Based Public-Key Encryption Scheme.

27. A Novel Memristor-Based Multi-Vortex Hyper-Chaotic Circuit Design and its Application in Image Encryption.

28. High-Performance Hardware Implementation of the KATAN Lightweight Cryptographic Cipher.

29. A Novel Steganography Algorithm Based on Quantization Table Modification and Image Scrambling in DCT Domain.

30. Cryptanalysis of Chaos-Based Cryptosystem from the Hardware Perspective.

31. Fractional Order Spatiotemporal Chaos with Delay in Spatial Nonlinear Coupling.

32. A New 3D Discrete Hyperchaotic System and Its Application in Secure Transmission.

33. Fuzzy Perspective of Online Games by Using Cryptography and Cooperative Game Theory.

34. On the primitivity of the AES-128 key-schedule.

35. A FIRST CRYPTOSYSTEM FOR SECURITY OF TWO-DIMENSIONAL DATA.

36. Beta Products of Fuzzy Graphs with Application in Cryptography.

37. A NOVEL QUANTUM STEGANOGRAPHY PROTOCOL BASED ON PROBABILITY MEASUREMENTS.

38. Cryptanalysis and Improvement of a Color Image Encryption Scheme Based on DNA Sequences and Multiple 1D Chaotic Maps.

39. Redundant-Signed-Digit-Based High Speed Elliptic Curve Cryptographic Processor.

40. An Analysis of Digraphs and Period Properties of the Logistic Map on Z(pn).

41. Flexible Architectures for Cryptographic Algorithms — A Systematic Literature Review.

42. ON GUESS AND DETERMINE ANALYSIS OF RABBIT.

43. Low Power High Speed MISTY1 Cryptography Approaches.

44. Evolvable Hardware-Based Data Security System Using Image Steganography Through Dynamic Partial Reconfiguration.

45. A Sensitive Image Encryption Algorithm Based on a Higher-Dimensional Chaotic Map and Steganography.

46. Representation of integers by k-generalized Fibonacci sequences and applications in cryptography.

47. Implementation of Symmetric Functions Using Memristive Nanocrossbar Arrays and their Application in Cryptography.

48. Cryptanalysis of Some Self-Synchronous Chaotic Stream Ciphers and Their Improved Schemes.

49. On some properties of single power cyclic hypergroups and regular relations.

50. PREFACE.