Search

Showing total 3,457 results

Search Constraints

Start Over You searched for: Topic cryptography Remove constraint Topic: cryptography Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years Publisher springer nature Remove constraint Publisher: springer nature
3,457 results

Search Results

1. Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis.

2. 2DOTS-multi-bit-encoding for robust and imperceptible image watermarking.

3. Errorless robust JPEG steganography using steganographic polar codes.

4. BLE-based secure tracking system proposal.

5. Compressed sensing based visually secure multi-secret image encryption-sharing scheme.

6. Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing.

7. Hamming codes for wet paper steganography.

8. Comparative analysis between a pixel-wise image encryption scheme and AES in a web application context.

9. A high capacity video steganography based on intra luma and chroma modes.

10. A review on image steganographic techniques based on optimization algorithms for secret communication.

11. Enhancing Data Security of Cloud Based LMS.

12. Research on the optimization of communication protocol in network security protocol.

13. Ethics of Quantum Computing: an Outline.

14. Securing edge computing using cryptographic schemes: a review.

15. Paillier cryptosystem enhancement for Homomorphic Encryption technique.

16. Efficient quantum algorithms for some instances of the semidirect discrete logarithm problem.

17. LTLBC: a low-latency lightweight block cipher for internet of things.

18. Comparative analysis of lattice-based cryptographic schemes for secure IoT communications.

19. Vaccine for digital images against steganography.

20. Physical Zero-Knowledge Proof for Sukoro.

21. Printing Protocol: Physical ZKPs for Decomposition Puzzles.

22. RAB: A lightweight block cipher algorithm with variable key length.

23. Meet-in-the-middle attacks on AES with value constraints.

24. Two modifications for Loidreau's code-based cryptosystem.

25. Efficient post-quantum secure deterministic wallet scheme.

26. Algebraic properties of the maps χn.

27. Preimage attacks on reduced-round Ascon-Xof.

28. An efficient privacy-preserving recommender system in wireless networks.

29. A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model.

30. A large-scale data security detection method based on continuous time graph embedding framework.

31. Genetic algorithm and hamilton path based data hiding scheme including embedding cost optimization.

32. Power Allocation under Given Secret Key Generation Rate for Secure Wireless OFDM Systems.

33. Preface: Special Issue on Card-Based Cryptography.

34. A Review on Blockchain and IoT Integration from Energy, Security and Hardware Perspectives.

36. Improved homomorphic evaluation for hash function based on TFHE.

37. Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication.

38. Link-based penalized trust management scheme for preemptive measures to secure the edge-based internet of things networks.

39. An edge computing oriented unified cryptographic key management service for financial context.

40. Combining MILP modeling with algebraic bias evaluation for linear mask search: improved fast correlation attacks on SNOW.

41. Secure chaotic image encryption method using random graph traversal and three step diffusion.

42. Quantum implementation of SHA1 and MD5 and comparison with classical algorithms.

43. The state diagram of χ.

44. An image steganography scheme based on ResNet.

45. Mobi-Sense: mobility-aware sensor-fog paradigm for mission-critical applications using network coding and steganography.

46. Weak rotational property and its application.

47. Quantum steganography scheme and circuit design based on the synthesis of three grayscale images in the HSI color space.

48. Simple method of selecting totalistic rules for pseudorandom number generator based on nonuniform cellular automaton.

49. A novel block encryption method based on Catalan random walks.

50. Directional modulation techniques for secure wireless communication: a comprehensive survey.