Showing 1 - 20 results of 378 for search '"Cryptography"', query time: 0.07s Refine Results
  1. 1

    Public-Key cryptography / by Salomaa, Arto

    Published 2010
    Subjects:
    View in OPAC
    Book
  2. 2

    A Review of DNA Cryptography by Ling Chu, Yanqing Su, Xiangyu Yao, Peng Xu, Wenbin Liu

    Published 2025-01-01
    “…We then comprehensively review 2 types of DNA cryptography: pseudo-DNA cryptography and natural DNA cryptography. …”
    Get full text
    Article
  3. 3

    Survey of braid-based cryptography by ZHU Ping1, WEN Qiao-yan2

    Published 2009-01-01
    “…The achievements of braid-based cryptography were surveyed: some recently developed cryptographic schemes were introduced, including key exchange protocols enciphering-deciphering and authentication schemes. …”
    Get full text
    Article
  4. 4

    Lossless sharing visual cryptography by Bin YU, Zheng-xin FU

    Published 2013-03-01
    Subjects: “…isual cryptography…”
    Get full text
    Article
  5. 5

    Perfect contrast visual cryptography scheme by HAN Yan-yan1, HE Wen-cai1, HU Yu-pu1

    Published 2009-01-01
    Subjects: “…visual cryptography…”
    Get full text
    Article
  6. 6
  7. 7

    Cryptography algorithm for wireless channel of CBTC system by WANG Chao1, LIU Li-li1, NIU Zhi-hua2, SHI Xiang-yong1, ZHANG Huan-guo3

    Published 2011-01-01
    “…As to the disadvantages of RC4 which was used for CBTC system,a new cryptography algorithm based on Montgomery-form ECC was brought forward.Compared with the traditional Montgomery elliptic curve,the improved algorithm would resume the value of y-coordinate with more security.In addition,compared with the traditional ECC,it has faster computing speed and can effectively resist the timing attack and energy attack.The new Montgomery-form ECC algorithm has accelerated current ECC encoding speed and would make great improvement to the implementation of ECC in CBTC and other wireless communication.…”
    Get full text
    Article
  8. 8

    Multistage Encryption for Text Using Steganography and Cryptography by Mohammed Majid Msallam, Fayez Aldoghan

    Published 2023-03-01
    “…Finally, our research provides more security because of the mixture between cryptography and steganography. …”
    Get full text
    Article
  9. 9

    Progress and Security Analysis of Quantum Cryptography Communication by Junsen Lai, Bingbing Wu, Shaohui Li, Wenyu Zhao, Haiyi Zhang

    Published 2015-06-01
    Subjects: “…quantum cryptography communication…”
    Get full text
    Article
  10. 10
  11. 11

    Hybrid Cryptography Based on Planets: Phobos & Deimos by Kraicha Ayoub, Touil Hamza, El Akkad Nabil

    Published 2025-01-01
    “…To address these issues, it is crucial to innovate in cryptography, the backbone of data security. This document presents the Phobos and Deimos encryption method, inspired by Mars’ moons. …”
    Get full text
    Article
  12. 12
  13. 13

    A Survey of Post-Quantum Cryptography Migration in Vehicles by Nils Lohmiller, Sabrina Kaniewski, Michael Menth, Tobias Heer

    Published 2025-01-01
    Subjects: “…Post-quantum cryptography (PQC)…”
    Get full text
    Article
  14. 14

    Electronic Voting Protocol Using Identity-Based Cryptography by Gina Gallegos-Garcia, Horacio Tapia-Recillas

    Published 2015-01-01
    “…Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. …”
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    A Privacy-Preserving Biometric Recognition System with Visual Cryptography by Lijing Ren, Denghui Zhang

    Published 2022-01-01
    “…Visual cryptography combines perfect ciphers and secret sharing in cryptography with images, thus eliminating the complex operations in existing privacy-preserving schemes based on cryptography or watermarking. …”
    Get full text
    Article
  18. 18

    A Survey of Efficient Lightweight Cryptography for Power-Constrained Microcontrollers by Jesús Soto-Cruz, Erica Ruiz-Ibarra, Javier Vázquez-Castillo, Adolfo Espinoza-Ruiz, Alejandro Castillo-Atoche, Joaquin Mass-Sanchez

    Published 2024-12-01
    “…This review paper assesses the implementation of lightweight cryptographic algorithms for power-constrained microcontrollers in IoT systems using symmetric cryptography. The implemented algorithms analyze the resource constraints of the IoT devices and compare their performance for the efficient implementation of secure monitoring systems. …”
    Get full text
    Article
  19. 19

    Fare non-repudiation protocol based on identity-based cryptography by LIU Hong-wei, XIE Wei-xin, YU Jian-ping, ZHANG Peng

    Published 2009-01-01
    Subjects: “…identity-based cryptography…”
    Get full text
    Article
  20. 20