Current Search:  Data encryption Computer science (x)

View All Items

  • CSV Spreadsheet
(1 - 20 of 34)

Pages

Quantum-Resistant Key Agreement and Key Encapsulation
Cryptanalysis of small private key RSA
Covert and multilevel visual cryptographic schemes
Power based wide collision attacks on AES
Quantum Circuits for Symmetric Cryptanalysis
Comparison of embedded security versus separated security in an application
Enhanced 1-D chaotic key-based algorithm for image encryption
Information hiding: Digital watermarking techniques
Data mining heuristic-¬based malware detection for android applications
SELECTED APPLICATIONS OF MPC
Design and analysis of key establishment protocols
Cryptography in the presence of key-dependent messages
discrete logarithm problem in non-abelian groups
Adaptive two-level watermarking for binary document images
Password-authenticated two-party key exchange with long-term security
Fuzzy vault fingerprint cryptography: Experimental and simulation studies
APPLICATION OF BLOCKCHAIN NETWORK FOR THE USE OF INFORMATION SHARING
Elliptic curves: identity-based signing and quantum arithmetic
Shamir's secret sharing scheme using floating point arithmetic
algebraic attack on block ciphers

Pages