-
1
-
2
Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives
Published 2024-06-01Subjects: Get full text
Article -
3
Encrypt, sign, attack : a compact introduction to cryptography /
Published 2022Subjects: View in OPAC
Book -
4
Implementation of Simplified Data Encryption Standard on FPGA using VHDL
Published 2022-03-01Subjects: “…Cryptography, DES, S-DES, FPGA, VHDL…”
Get full text
Article -
5
DIGITAL CURRENCY: A CONCEPTUAL FRAMEWORK OF PERFORMANCE
Published 2023-02-01Subjects: “…Cryptography, cryptocurrency, volume, market capitalization, price…”
Get full text
Article -
6
-
7
In-depth study of lightweight block ciphers: Performance assessment and implementation on sensor motes
Published 2025-02-01Subjects: Get full text
Article -
8
Homomorphic Signature With Designated Evaluator
Published 2025-01-01Subjects: “…Cryptography…”
Get full text
Article -
9
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01Subjects: Get full text
Article -
10
An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)
Published 2024-12-01Subjects: Get full text
Article -
11
SURVEY AND PROPOSED METHOD TO DETECT ADVERSARIAL EXAMPLES USING AN ADVERSARIAL RETRAINING MODEL
Published 2024-08-01Get full text
Article -
12
Smart Home Security: An Efficient Multi-Factor Authentication Protocol
Published 2024-01-01Get full text
Article -
13
Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB
Published 2022-02-01“…Cryptography and steganography have similarities in terms of security. …”
Get full text
Article -
14
Decentralized identifiers based IoT data trusted collection
Published 2025-02-01Get full text
Article -
15
Pengamanan Citra Berwarna Menggunakan Kriptografi Visual Skema Meaningful Shares dan Steganografi LSB
Published 2022-12-01“…Abstract Information security is important so that files that are confidential can be protected from unauthorized persons, therefor there is Cryptography and Steganograph. Cryptography is used to encrypt files by changing it, while Steganography inserts the file without changing it.for image, there is the branch that can be used to secure it, namely Visual Cryptography secret sharing scheme. …”
Get full text
Article -
16
Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework
Published 2025-02-01“…Findings indicate that this hybrid blockchain model, enhanced with quantum-resistant cryptography and decentralized governance, significantly improves EHR security. …”
Get full text
Article -
17
The condition number associated with ideal lattices from odd prime degree cyclic number fields
Published 2025-02-01“…The condition number of a generator matrix of an ideal lattice derived from the ring of integers of an algebraic number field is an important quantity associated with the equivalence between two computational problems in lattice-based cryptography, the “Ring Learning With Errors (RLWE)” and the “Polynomial Learning With Errors (PLWE)”. …”
Get full text
Article -
18
An Image Sharing Encryption Management System For Kabale University.
Published 2024“…Myriad methods of protection are used ranging from a simple authentication password to most complex cryptography or Steganography algorithms for hiding the extremely sensitive data. …”
Get full text
Thesis -
19
Pengamanan Citra Digital Menggunakan Kriptografi DnaDan Modified LSB
Published 2024-12-01“…Abstract Digital image encryption using DNA Cryptography combines computational science with biological principles to provide dual security. …”
Get full text
Article -
20