Printer Friendly

Browse Cryptography topic

Research subtopic

Articles

1-72 out of 72 article(s)
Title Author Type Date Words
Research Work (r & D) development Of Requirements For A Computing Platform Of A Cryptographic Authentication Token Implemented In The Form Of An Identification Card, Based On Its Model Implementation. Dec 9, 2018 180
Study And Evaluation Of Secure Devices And Components. Sep 15, 2018 178
Study And Evaluation Of Secure Devices And Components. Sep 4, 2018 176
Research Work Development Of Requirements For The Computing Platform Of The Cryptographic Authentication Token, Developed In The Form Of An Identification Card, Based On Its Breadboard Implementation. Aug 29, 2018 138
Research Work Development Of Requirements For The Computing Platform Of The Cryptographic Authentication Token, Developed In The Form Of An Identification Card, Based On Its Breadboard Implementation For Activity 12 Establishment Of The Belarusian Integra. Jul 19, 2018 161
Anomalous Behaviour of Cryptographic Elliptic Curves over Finite Field. Fujdiak, Radek; Dzurenda, Petr; Mlynek, Petr; Misurec, Jiri; Orgon, Milos; Sergey, Bezzateev Report Oct 1, 2017 5751
Enhanced multicomponent data secure mechanism for cloud storage system using elliptical curve cryptography. Britto, A. Lauro Eugin; Maheshwari, N. Uma Report May 1, 2017 3904
Cryptographic enhanced shared data on conserve encipher text update in cloud computing. Dhanabal, E.; Harish, G.; YogaDinesh, S.; Ambethkumar, V.D.; Rajendiran, M. Report Apr 30, 2017 3605
A survival study of security attacks, security mechanisms and security challenges in network security. Jayasmruthi, A.; Parthasarathi, P.; Sathishkumar Report Apr 15, 2017 3948
A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding. Sheela, S.J.; Suresh, K.V.; Tandur, Deepaknath Report Jan 1, 2017 6195
Improvements for Finding Impossible Differentials of Block Cipher Structures. Luo, Yiyuan; Lai, Xuejia Report Jan 1, 2017 7563
A Certificateless Ring Signature Scheme with High Efficiency in the Random Oracle Model. Zhang, Yingying; Zeng, Jiwen; Li, Wei; Zhu, Huilin Report Jan 1, 2017 7675
Design of Initial Value Control for Modified Lorenz-Stenflo System. Wu, Yuan-Long; Yang, Cheng-Hsiung; Wu, Chang-Hsi Report Jan 1, 2017 2114
Efficient signature schemes from R-LWE. Wang, Ting; Yu, Jianping; Zhang, Peng; Zhang, Yong Report Aug 1, 2016 6453
RSA-type algebra structures. Tran, Long D.; Tran, Thu D.; Choi, Deokjai; Nguyen, Thuc D. Report Jun 1, 2016 6127
Impossible differential cryptanalysis on DVB-CSA. Zhang, Kai; Guan, Jie; Hu, Bin Report Apr 1, 2016 4828
Trust based authentication and key establishment for secure routing in WMN. Akilarasu, G.; Shalinie, S. Mercy Report Dec 1, 2014 4913
Survey on lightweight primitives and protocols for RFID in wireless sensor networks. Manjulata, Adarsh Kumar Report Apr 1, 2014 12121
NSA infiltrated RSA security more deeply than thought - study. Mar 31, 2014 1034
Artificial immune based cryptography optimization algorithm. Zhou, Xuanwu; Liu, Kaihua; Jin, Zhigang; Tian, Shourong; Fu, Yan; Qin, Lianmin Report Mar 1, 2014 5941
Conjugacy systems based on nonabelian factorization problems and their applications in cryptography. Gu, Lize; Zheng, Shihui Report Jan 1, 2014 8288
Analysis of the perfect table fuzzy rainbow tradeoff. Kim, Byoung-Il; Hong, Jin Report Jan 1, 2014 16043
Scalable hierarchical identity-based signature scheme from lattices. Noh, Geontae; Jeong, Ik Rae Report Dec 1, 2013 5728
A new roaming authentication framework for wireless communication. Li, Xiaowei; Zhang, Yuqing; Liu, Xuefeng; Cao, Jin; Zhao, Qianqian Report Aug 1, 2013 6768
Provably secure forward secure certificateless proxy signature scheme. Li, Jiguo; Li, Yanqiong; Zhang, Yichen Report Aug 1, 2013 10065
An efficient biometric identity based signature scheme. Yang, Yang; Hu, Yupu; Zhang, Leyou Report Aug 1, 2013 6856
An efficient solution to generalized Yao's Millionaires problem. Zhang, Yuan; Zhong, Sheng Report Jul 1, 2013 4070
Enhanced time-bound ticket-based mutual authentication scheme for cloud computing. Pippal, Ravi Singh; Jaidhar, C.D.; Tapaswi, Shashikala Report Jun 1, 2013 5689
Certificate-based encryption scheme without pairing. Yao, Ji; Li, Jiguo; Zhang, Yichen Report Jun 1, 2013 6375
Cryptanalysis of an 'Efficient-Strong Authentication Protocol (E-SAP) for healthcare applications using wireless medical sensor networks'. Khan, Muhammad Khurram; Kumari, Saru; Singh, Pitam Report May 1, 2013 5460
New constructions of hierarchical attribute-based encryption for fine-grained access control in cloud computing. Zhang, Leyou; Hu, Yupu Report May 1, 2013 5624
Power analysis attacks and countermeasures on NTRU-based Wireless Body Area Networks. Wang, An; Zheng, Xuexin; Wang, Zongyue Report May 1, 2013 4233
Research, development and simulation of quantum cryptographic protocols. Anghel, C. Report Apr 1, 2013 2968
Computers. Mar 22, 2013 865
Secure modulus data hiding scheme. Kuo, Wen-Chung Report Mar 1, 2013 5492
Finding impossible differentials for Rijndael-like and 3D-like structures. Cui, Ting; Jin, Chen-hui Report Mar 1, 2013 5016
DNA based cryptography: an overview and analysis. Jacob, Grasha; Murugan, A. Report Mar 1, 2013 2237
Efficient certificateless authenticated asymmetric group key agreement protocol. Wei, Guiyi; Yang, Xianbo; Shao, Jun Technical report Dec 1, 2012 6691
Ross: low-cost self-securing VoIP communication framework. Syafalni, Alfin; Samsudin, Azman; Jaafar, Yazid; Omar, Mohd. Adib Technical report Dec 1, 2012 8161
Crypto-compression of images based on the ANNs and the AES algorithm. Benlcouiri, Y.; Benabdellah, M.; Ismaili, M.C.; Azizi, A. Report Oct 1, 2012 2771
Explicit formulas describing: the binary operations calculus in [E.sub.a,b]. Chillali, Abdelhakim; Charkani, Mohamed Report Oct 1, 2012 2929
A new shiftcolumn transformation: an enhancement of Rijndael key scheduling. Sulaiman, Salasiah; Muda, Zaiton; Juremi, Julia; Mahmod, Ramlan; Yasin, Sharifah Md. Report Jul 1, 2012 2634
Finite field arithmetic architecture based on cellular array. Kim, Kee-Won; Jeon, Jun-Cheol Report Apr 1, 2012 3043
Power amount analysis: an efficient means to reveal the secrets in cryptosystems. Tian, Qizhi; Huss, Sorin A. Report Apr 1, 2012 6870
Multiple secret keys based security for wireless sensor networks. Kesavan, V. Thiruppathy; Radhakrishnan, S. Report Apr 1, 2012 6232
NOCAS: a nonlinear Cellular Automata based stream cipher. Karmakar, Sandip; Chowdhury, Dipanwita Roy Report Jan 1, 2012 5265
Optimal elliptic curve scalar multiplication using double-base chains. Suppakitpaisarn, Vorapong; Imai, Hiroshi; Edahiro, Masato Report Jan 1, 2012 11872
Identity--based multiple key agreement scheme. Dehkordi, Massoud Hadian; Alimoradi, Reza Report Dec 1, 2011 4489
An eCK-secure authenticated key exchange protocol without random oracles. Moriyama, Daisuke; Okamoto, Tatsuaki Report Mar 1, 2011 8476
Data hiding in halftone images by XOR block-wise operation with difference minimization. Yang, Ching-Nung; Ye, Guo-Cin; Kim, Cheonshik Report Feb 1, 2011 9403
Energy efficiency comparison with cipher strength of AES and Rijndael cryptographic algorithms in mobile devices/Mobiliuju irenginiu AES ir Rijndael kriptoalgoritmu energijos sanaudu ir saugumo polyginimas. Toldinas, J.; Stuikys, V.; Damasevicius, R.; Ziberkas, G.; Banionis, M. Report Feb 1, 2011 2124
Multisignature scheme based on discrete logarithms in the plain public key model. Shao, Zuhua Report Dec 1, 2010 6115
New techniques for anonymous HIBE with short ciphertexts in prime order groups. Lee, Kwangsu; Lee, Dong Hoon Report Oct 1, 2010 9496
PKI and its applications in e-commerce in China. Bai, Qing-hai Report Jun 30, 2010 2977
Privacy-preserving distributed algorithm for sparse vector sum. Zhong, Sheng Report May 1, 2010 2938
Lightweight cryptography and RFID: tackling the hidden overhead. Poschmann, Axel; Robshaw, Matthew J.B.; Vater, Frank; Paar, Christof Report Apr 1, 2010 7228
Building safe realtime channel for mobile teleoperated robots. Burian, Frantisek; Vesely, Milos; Zalud, Ludek Report Jan 1, 2010 1389
Secure electronic transactions using elliptic curves encryption. Oana, Florentina-Andra Report Jan 1, 2010 1815
Analysis of unpredictable cryptographic pseudo-random number generator based on non-linear dynamic chaotic system/Nenuspejamas kriptografinis pseudoatsitiktiniu skaiciu generatorius netiesines dinamines chaotines sistemos parindu. Citavicius, A.; Jonavicius, A. Report Sep 1, 2009 2411
Estimators in cryptographic models. Constantinescu, Nicolae; Boldea, Costin; Cosulschi, Mirel; Gabroveanu, Mihai Report Jan 1, 2009 1628
Cryptography with cellular automata. Gabr, Mahmoud M.H.; Hassan, Yasser F.; Mohamed, Khaled Mohamed Report Jan 1, 2009 2531
Practical password-authenticated three-party key exchange. Kwon, Jeong Ok; Jeong, Ik Rae; Lee, Dong Hoon Report Dec 1, 2008 9967
An improved biometric template protection method based on non-uniform quantization. Han, Qi; Wang, Zhifang; Niu, Xiamu Report Apr 1, 2008 4226
Schrodinger's key. Brief article Sep 1, 2007 181
NIST validates 100th Advanced Encryption Standard implementation. Nov 1, 2003 510
NIST updates Federal Information Processing Standard (FIPS) for secure hash standard to include additional algorithms. (General Development). Brief Article Jan 1, 2003 126
Secrecy by Typing in Security Protocols. ABADI, MARTIN Sep 1, 1999 19204
Quick cracking of secret code. Peterson, Ivars Brief Article Aug 1, 1998 366
Quantum cheating. Peterson, Ivars Jun 14, 1997 619
Timing attack beats cryptographic keys. Peterson, Ivars Brief Article Dec 16, 1995 372
Prying open the cryptographic door. Peterson, I. Feb 12, 1994 606
Viewpoint: a student's view of cryptography in computer science. Steinberg, Steve Feb 1, 1991 1758

Terms of use | Privacy policy | Copyright © 2020 Farlex, Inc. | Feedback | For webmasters