Search

Showing total 3,904 results

Search Constraints

Start Over You searched for: Topic ciphers Remove constraint Topic: ciphers Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years
3,904 results

Search Results

1. Taxonomy of Image Encryption Techniques - A Survey

3. Lightweight Countermeasure to Differential-Plaintext Attacks on Permutation Ciphers

4. A Method of Encoding Coordinates on the Paper for Digitizing Handwriting.

5. All-printed semiquantitative paper-based analytical devices relying on QR code array readout.

7. Informed Watermarking by Means of Orthogonal and Quasi-Orthogonal Dirty Paper Coding.

8. Parallel Search Using Probabilistic DNA Sticker Model to Cryptanyze One Time Pad Polyalphabetic Cipher.

9. Mobile Based Attendance System Using QR Code.

10. Product of Finite Maximal P-Codes. This paper was supported in part by HK UGC grants 9040596, 9040511 and City U Strategic Grants 7001189, 7001060, and by the Natural Science Foundation of China (project No. 60073056) and the Guangdong Provincial Natural Science Foundation (project No. 001174).

11. A Polynomial Multiplication Accelerator for Faster Lattice Cipher Algorithm in Security Chip.

12. An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms.

13. Mediation and Transcendence: Balancing Postphenomenological Theory of Technological Mediation with Karl Jaspers's Metaphysics of Ciphers.

14. On the Density of Irreducible NFSRs.

15. Secret Message Scytales.

17. Further Results on the Distinctness of Binary Sequences Derived From Primitive Sequences Modulo Square-Free Odd Integers.

18. Improved Neural Differential Distinguisher Model for Lightweight Cipher Speck.

19. Dynamic RNA Coding Color Image Cipher Based on Chain Feedback Structure.

20. Data Security Architecture in Cloud Computing based on Elliptic Curve Cryptography with Special Focus on Lowering the Cipher Space.

21. Development of Security Rules and Mechanisms to Protect Data from Assaults.

22. Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace.

23. Chapter 14: Project Evaluation Paper: Mobile Resource Guarantees.

24. Leo Marks' "mental one-time pad": an experimental cipher for British special operations in World War II.

25. An ultra-lightweight block cipher with string transformations.

26. SC-SA: Byte-Oriented Lightweight Stream Ciphers Based on S-Box Substitution.

27. Color Image Encryption Based on an Evolutionary Codebook and Chaotic Systems.

28. Image and Text Encrypted Data with Authorized Deduplication in Cloud.

29. A SURVEY OF SOLUTIONS AND FUTURE DIRECTIONS FOR THE CHALLENGES OF IMPLEMENTING ERASURE CODES IN CLOUD AND FOG COMPUTING.

31. An enriched cryptosystem based Polybius cipher using graph labeling techniques.

32. Safeguarding Research: A Review of Economics Journals' Preservation Policies for Published Code and Data Files.

33. The Prospects of Quantum Secure Direct Communication: An Overview.

34. Hiding algorithm based fused images and Caesar cipher with intelligent security enhancement.

35. New mode of operation inspired by the braid of long hair.

36. Weak rotational property and its application.

37. Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks.

39. Public Key Cryptosystems (Research Paper).

40. Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature.

41. XOR Vector Space based S-Box generation and its Application to DES and AES for the Time-Efficient Image Encryption.

42. Low area and high throughput hardware implementations for the LILLIPUT cipher.

43. Parallel Multi-core Implementation of the Optimized Speck Cipher.

44. Design and implementation in an Altera's cyclone IV EP4CE6E22C8 FPGA board of a fast and robust cipher using combined 1D maps.

45. Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.

46. Novel, Fast, Strong, and Parallel: A Colored Image Cipher Based on SBTM CPRNG.

47. 对轻量级分组密码PICO 算法的差分攻击.

48. Culture codes of scientific concepts in global scientific online discourse.

49. Explicit Constructions of MSR Codes for Clustered Distributed Storage: The Rack-Aware Storage Model.

50. Maximal Ferrers Diagram Codes: Constructions and Genericity Considerations.