Works matching DE "CRYPTOGRAPHIC equipment"


Results: 75
    1
    2
    3
    4

    LDPC CODES FOR PHYSICAL LAYER SECURITY.

    Published in:
    Military Technical Courier / Vojnotehnicki Glasnik, 2018, v. 66, n. 4, p. 900, doi. 10.5937/vojtehg66-14776
    By:
    • Marić, Sonja R. Kuljanski
    Publication type:
    Article
    5
    6
    7
    8

    1002 km twin-field quantum key distribution with finite-key analysis.

    Published in:
    Quantum Frontiers, 2023, v. 2, n. 1, p. 1, doi. 10.1007/s44214-023-00039-9
    By:
    • Liu, Yang;
    • Zhang, Wei-Jun;
    • Jiang, Cong;
    • Chen, Jiu-Peng;
    • Ma, Di;
    • Zhang, Chi;
    • Pan, Wen-Xin;
    • Dong, Hao;
    • Xiong, Jia-Min;
    • Zhang, Cheng-Jun;
    • Li, Hao;
    • Wang, Rui-Chun;
    • Lu, Chao-Yang;
    • Wu, Jun;
    • Chen, Teng-Yun;
    • You, Lixing;
    • Wang, Xiang-Bin;
    • Zhang, Qiang;
    • Pan, Jian-Wei
    Publication type:
    Article
    9
    10
    11
    12
    13
    14
    15
    16

    SIGNATURES OF VIBER SECURE TRAFFIC.

    Published in:
    Journal of Digital Forensics, Security & Law, 2017, v. 12, n. 2, p. 109
    By:
    • Sudozai, M. A. K.;
    • Habib, N.;
    • Saleem, S.;
    • Khan, A. A.
    Publication type:
    Article
    17
    18

    Fast physical random bit generation with chaotic semiconductor lasers.

    Published in:
    Nature Photonics, 2008, v. 2, n. 12, p. 728, doi. 10.1038/nphoton.2008.227
    By:
    • Uchida, Atsushi;
    • Amano, Kazuya;
    • Inoue, Masaki;
    • Hirano, Kunihito;
    • Naito, Sunao;
    • Someya, Hiroyuki;
    • Oowada, Isao;
    • Kurashige, Takayuki;
    • Shiki, Masaru;
    • Yoshimori, Shigeru;
    • Yoshimura, Kazuyuki;
    • Davis, Peter
    Publication type:
    Article
    19
    20
    21
    22
    23
    24

    Beware the Blockchain.

    Published in:
    ISSA Journal, 2016, v. 14, n. 11, p. 14
    By:
    • Martin, Karen
    Publication type:
    Article
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35

    A Lattice-Based Group Authentication Scheme.

    Published in:
    Applied Sciences (2076-3417), 2018, v. 8, n. 6, p. 987, doi. 10.3390/app8060987
    By:
    • Huang, Jheng-Jia;
    • Tseng, Yi-Fan;
    • Yang, Qi-Liang;
    • Fan, Chun-I
    Publication type:
    Article
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48

    How to Scatter a Secret?

    Published in:
    Cryptologia, 2012, v. 36, n. 1, p. 46, doi. 10.1080/01611194.2012.635100
    By:
    • Brier, Eric;
    • Fang, Wenjie;
    • Naccache, David
    Publication type:
    Article
    49
    50