Search

Showing total 3,503 results

Search Constraints

Start Over You searched for: Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Topic ciphers Remove constraint Topic: ciphers Language english Remove constraint Language: english
3,503 results

Search Results

1. A Method of Encoding Coordinates on the Paper for Digitizing Handwriting.

3. All-printed semiquantitative paper-based analytical devices relying on QR code array readout.

5. Informed Watermarking by Means of Orthogonal and Quasi-Orthogonal Dirty Paper Coding.

6. Parallel Search Using Probabilistic DNA Sticker Model to Cryptanyze One Time Pad Polyalphabetic Cipher.

7. Mobile Based Attendance System Using QR Code.

8. Product of Finite Maximal P-Codes. This paper was supported in part by HK UGC grants 9040596, 9040511 and City U Strategic Grants 7001189, 7001060, and by the Natural Science Foundation of China (project No. 60073056) and the Guangdong Provincial Natural Science Foundation (project No. 001174).

9. A Polynomial Multiplication Accelerator for Faster Lattice Cipher Algorithm in Security Chip.

10. An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms.

11. Mediation and Transcendence: Balancing Postphenomenological Theory of Technological Mediation with Karl Jaspers's Metaphysics of Ciphers.

12. On the Density of Irreducible NFSRs.

13. Further Results on the Distinctness of Binary Sequences Derived From Primitive Sequences Modulo Square-Free Odd Integers.

14. Improved Neural Differential Distinguisher Model for Lightweight Cipher Speck.

15. Development of Security Rules and Mechanisms to Protect Data from Assaults.

16. A Compact Implementation of Shadow on an IoT Processor.

17. Leo Marks' "mental one-time pad": an experimental cipher for British special operations in World War II.

18. An ultra-lightweight block cipher with string transformations.

19. SC-SA: Byte-Oriented Lightweight Stream Ciphers Based on S-Box Substitution.

20. Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace.

21. Dynamic RNA Coding Color Image Cipher Based on Chain Feedback Structure.

22. Image and Text Encrypted Data with Authorized Deduplication in Cloud.

23. A SURVEY OF SOLUTIONS AND FUTURE DIRECTIONS FOR THE CHALLENGES OF IMPLEMENTING ERASURE CODES IN CLOUD AND FOG COMPUTING.

25. Data Security Architecture in Cloud Computing based on Elliptic Curve Cryptography with Special Focus on Lowering the Cipher Space.

26. The Prospects of Quantum Secure Direct Communication: An Overview.

27. Hiding algorithm based fused images and Caesar cipher with intelligent security enhancement.

28. Utilizing FWT in linear cryptanalysis of block ciphers with various structures.

29. Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks.

31. Public Key Cryptosystems (Research Paper).

32. Color Image Encryption Based on an Evolutionary Codebook and Chaotic Systems.

33. Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature.

34. XOR Vector Space based S-Box generation and its Application to DES and AES for the Time-Efficient Image Encryption.

35. Low area and high throughput hardware implementations for the LILLIPUT cipher.

36. Parallel Multi-core Implementation of the Optimized Speck Cipher.

37. Design and implementation in an Altera's cyclone IV EP4CE6E22C8 FPGA board of a fast and robust cipher using combined 1D maps.

38. Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.

39. Novel, Fast, Strong, and Parallel: A Colored Image Cipher Based on SBTM CPRNG.

40. Weak rotational property and its application.

41. New mode of operation inspired by the braid of long hair.

42. Culture codes of scientific concepts in global scientific online discourse.

43. Explicit Constructions of MSR Codes for Clustered Distributed Storage: The Rack-Aware Storage Model.

47. Information operator approach applied to the retrieval of the vertical distribution of atmospheric constituents from ground-based high-resolution FTIR measurements.

48. Benford's law in the Beale ciphers.

49. Quantum impossible differential attacks: applications to AES and SKINNY.

50. Visual image encryption scheme based on inter-intra-block scrambling and weighted diffusion.