Search

Showing total 3,886 results

Search Constraints

Start Over You searched for: Topic ciphers Remove constraint Topic: ciphers Language english Remove constraint Language: english
3,886 results

Search Results

1. A Method of Encoding Coordinates on the Paper for Digitizing Handwriting.

3. All-printed semiquantitative paper-based analytical devices relying on QR code array readout.

4. Parallel Search Using Probabilistic DNA Sticker Model to Cryptanyze One Time Pad Polyalphabetic Cipher.

6. Informed Watermarking by Means of Orthogonal and Quasi-Orthogonal Dirty Paper Coding.

7. Mobile Based Attendance System Using QR Code.

8. Product of Finite Maximal P-Codes. This paper was supported in part by HK UGC grants 9040596, 9040511 and City U Strategic Grants 7001189, 7001060, and by the Natural Science Foundation of China (project No. 60073056) and the Guangdong Provincial Natural Science Foundation (project No. 001174).

9. Mediation and Transcendence: Balancing Postphenomenological Theory of Technological Mediation with Karl Jaspers's Metaphysics of Ciphers.

10. A Polynomial Multiplication Accelerator for Faster Lattice Cipher Algorithm in Security Chip.

11. An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms.

12. Improved Neural Differential Distinguisher Model for Lightweight Cipher Speck.

13. On the Density of Irreducible NFSRs.

14. Secret Message Scytales.

16. Further Results on the Distinctness of Binary Sequences Derived From Primitive Sequences Modulo Square-Free Odd Integers.

17. WET PAPER CODES AND THE DUAL DISTANCE IN STEGANOGRAPHY.

18. Development of Security Rules and Mechanisms to Protect Data from Assaults.

19. Dynamic RNA Coding Color Image Cipher Based on Chain Feedback Structure.

20. Data Security Architecture in Cloud Computing based on Elliptic Curve Cryptography with Special Focus on Lowering the Cipher Space.

21. The Prospects of Quantum Secure Direct Communication: An Overview.

22. Hiding algorithm based fused images and Caesar cipher with intelligent security enhancement.

23. Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace.

24. Chapter 14: Project Evaluation Paper: Mobile Resource Guarantees.

25. Color Image Encryption Based on an Evolutionary Codebook and Chaotic Systems.

26. Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature.

27. Low area and high throughput hardware implementations for the LILLIPUT cipher.

28. Parallel Multi-core Implementation of the Optimized Speck Cipher.

29. A SURVEY OF SOLUTIONS AND FUTURE DIRECTIONS FOR THE CHALLENGES OF IMPLEMENTING ERASURE CODES IN CLOUD AND FOG COMPUTING.

30. Safeguarding Research: A Review of Economics Journals' Preservation Policies for Published Code and Data Files.

31. Image and Text Encrypted Data with Authorized Deduplication in Cloud.

33. An enriched cryptosystem based Polybius cipher using graph labeling techniques.

34. New mode of operation inspired by the braid of long hair.

35. Weak rotational property and its application.

36. Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks.

38. Public Key Cryptosystems (Research Paper).

39. Design and implementation in an Altera's cyclone IV EP4CE6E22C8 FPGA board of a fast and robust cipher using combined 1D maps.

40. Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.

41. Novel, Fast, Strong, and Parallel: A Colored Image Cipher Based on SBTM CPRNG.

42. Quantum impossible differential attacks: applications to AES and SKINNY.

43. Culture codes of scientific concepts in global scientific online discourse.

44. Explicit Constructions of MSR Codes for Clustered Distributed Storage: The Rack-Aware Storage Model.

45. Maximal Ferrers Diagram Codes: Constructions and Genericity Considerations.

46. PIR Array Codes With Optimal Virtual Server Rate.

47. New Constructions of MDS Euclidean Self-Dual Codes From GRS Codes and Extended GRS Codes.