Showing 1 - 20 results of 28 for search '"cryptography"', query time: 0.06s Refine Results
  1. 1

    Public-Key cryptography / by Salomaa, Arto

    Published 2010
    Subjects:
    View in OPAC
    Book
  2. 2
  3. 3

    Encrypt, sign, attack : a compact introduction to cryptography / by Manz, Olaf

    Published 2022
    Subjects:
    View in OPAC
    Book
  4. 4

    Implementation of Simplified Data Encryption Standard on FPGA using VHDL by salim Qadir Mohammed

    Published 2022-03-01
    Subjects: “…Cryptography, DES, S-DES, FPGA, VHDL…”
    Get full text
    Article
  5. 5

    DIGITAL CURRENCY: A CONCEPTUAL FRAMEWORK OF PERFORMANCE by COLLINS NGWAKWE

    Published 2023-02-01
    Subjects: “…Cryptography, cryptocurrency, volume, market capitalization, price…”
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB by Agus Rakhmadi Mido, Erik Iman Heri Ujianto

    Published 2022-02-01
    “…Cryptography and steganography have similarities in terms of security. …”
    Get full text
    Article
  14. 14
  15. 15

    Pengamanan Citra Berwarna Menggunakan Kriptografi Visual Skema Meaningful Shares dan Steganografi LSB by Fariz Abid Darmawan, Ari Kusyanti, Rakhmadhanny Primananda

    Published 2022-12-01
    “…Abstract Information security is important so that files that are confidential can be protected from unauthorized persons, therefor there is Cryptography and Steganograph. Cryptography is used to encrypt files by changing it, while Steganography inserts the file without changing it.for image, there is the branch that can be used to secure it, namely Visual Cryptography secret sharing scheme. …”
    Get full text
    Article
  16. 16

    Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework by Rihab Benaich, Youssef Gahi, Saida El Mendili

    Published 2025-02-01
    “…Findings indicate that this hybrid blockchain model, enhanced with quantum-resistant cryptography and decentralized governance, significantly improves EHR security. …”
    Get full text
    Article
  17. 17

    The condition number associated with ideal lattices from odd prime degree cyclic number fields by de Araujo Robson Ricardo

    Published 2025-02-01
    “…The condition number of a generator matrix of an ideal lattice derived from the ring of integers of an algebraic number field is an important quantity associated with the equivalence between two computational problems in lattice-based cryptography, the “Ring Learning With Errors (RLWE)” and the “Polynomial Learning With Errors (PLWE)”. …”
    Get full text
    Article
  18. 18

    An Image Sharing Encryption Management System For Kabale University. by Bemera, Rauben

    Published 2024
    “…Myriad methods of protection are used ranging from a simple authentication password to most complex cryptography or Steganography algorithms for hiding the extremely sensitive data. …”
    Get full text
    Thesis
  19. 19

    Pengamanan Citra Digital Menggunakan Kriptografi DnaDan Modified LSB by Sabrina Adela Br Sibarani, Andreas Munthe, Ronsen Purba, Ali Akbar Lubis

    Published 2024-12-01
    “…Abstract Digital image encryption using DNA Cryptography combines computational science with biological principles to provide dual security. …”
    Get full text
    Article
  20. 20