Search

Showing total 353 results

Search Constraints

Start Over You searched for: Search Limiters Full Text Remove constraint Search Limiters: Full Text Topic cryptography Remove constraint Topic: cryptography Publication Year Range This year Remove constraint Publication Year Range: This year
353 results

Search Results

1. Parallel Search Using Probabilistic DNA Sticker Model to Cryptanyze One Time Pad Polyalphabetic Cipher.

2. A Survey on Emerging Blockchain Technology Platforms for Securing the Internet of Things.

3. Errorless robust JPEG steganography using steganographic polar codes.

4. E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval.

5. Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing.

6. Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular Networks.

7. Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography.

8. Survey of research on confidential computing.

9. On a class of permutation trinomials over finite fields.

10. Enhancing Security with Multi-level Steganography: A Dynamic Least Significant Bit and Wavelet-Based Approach.

11. Mixture Differential Cryptanalysis on Round-Reduced SIMON32/64 Using Machine Learning.

12. Information Theory, Living Systems, and Communication Engineering.

13. Secure encryption over the ring F2 + uF2 + vF2 + uvF2.

14. Motion vector‐domain video steganalysis exploiting skipped macroblocks.

15. A Generic NSRTD Framework for Characterizing Cellular Automaton Rules in Constant (0/1) Boundary Conditions.

16. Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks.

17. Possibility of land ownership transaction with non-fungible token technology: Minting survey plan.

18. Reversible Logic Gates and Applications - A Low Power Solution to VLSI Chips.

19. IoT Security for D-App in Supply Chain Management.

20. Enhancing Privacy in the Internet of Vehicles via Hyperelliptic Curve Cryptography.

21. Minoan Cryptanalysis: Computational Approaches to Deciphering Linear A and Assessing Its Connections with Language Families from the Mediterranean and the Black Sea Areas.

22. Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey.

23. Research on the Type Synthesis of a Regular Hexagonal Prism Rubik's Cube Mechanism.

24. Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon.

25. AI‐generated video steganography based on semantic segmentation.

26. Meet-in-the-middle attacks on AES with value constraints.

27. Efficient post-quantum secure deterministic wallet scheme.

28. Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions.

29. Reversible codes in the Rosenbloom-Tsfasman metric.

30. A new semiring and its cryptographic applications.

31. Performance Evaluation of Lightweight Stream Ciphers for Real-Time Video Feed Encryption on ARM Processor.

32. Algebraic properties of the maps χn.

33. Preimage attacks on reduced-round Ascon-Xof.

34. A novel approach to secure communication in mega events through Arabic text steganography utilizing invisible Unicode characters.

35. High Embedding Capacity Color Image Steganography Scheme Using Pixel Value Differencing and Addressing the Falling-Off Boundary Problem.

36. Comprehensive Neural Cryptanalysis on Block Ciphers Using Different Encryption Methods.

37. Text steganography by changing the black color.

38. Construction of a cryptographic function based on Bose-type Sidon sets.

39. Improved homomorphic evaluation for hash function based on TFHE.

40. Steganography in QR Codes—Information Hiding with Suboptimal Segmentation.

41. Design and Implementation of Lightweight Certificateless Secure Communication Scheme on Industrial NFV-Based IPv6 Virtual Networks.

42. A Secure Protocol Authentication Method Based on the Strand Space Model for Blockchain-Based Industrial Internet of Things.

43. Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature.

44. Enhancing Steganography through Optimized Quantization Tables.

45. Perform The Complex EFG Transform in Cryptography.

46. Flexible and Compact MLWE-Based KEM.

47. Integral Cryptanalysis of Reduced-Round IIoTBC-A and Full IIoTBC-B.

48. The Security Evaluation of an Efficient Lightweight AES Accelerator †.

49. Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance.

50. Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography.