Found: 164
Select item for more details and to access through your institution.
How to Compute an Isogeny on the Extended Jacobi Quartic Curves?
- Published in:
- International Journal of Electronics & Telecommunications, 2022, v. 68, n. 3, p. 463, doi. 10.24425/ijet.2022.139890
- By:
- Publication type:
- Article
Frontmatter.
- Published in:
- Journal of Mathematical Cryptology, 2018, v. 12, n. 3, p. i, doi. 10.1515/jmc-2018-frontmatter3
- Publication type:
- Article
Visual cryptograms of random grids via linear algebra.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 10, p. 12871, doi. 10.1007/s11042-017-4921-5
- By:
- Publication type:
- Article
A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/7080673
- By:
- Publication type:
- Article
Efficient and secure attribute-based signature for monotone predicates.
- Published in:
- Acta Informatica, 2017, v. 54, n. 5, p. 521, doi. 10.1007/s00236-016-0270-5
- By:
- Publication type:
- Article
A Flexible Fully Homomorphic Encryption.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 2, p. 761, doi. 10.1007/s11277-016-3796-5
- By:
- Publication type:
- Article
An Improved Level of Security for DNA Steganography Using Hyperelliptic Curve Cryptography.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 4, p. 1221, doi. 10.1007/s11277-016-3313-x
- By:
- Publication type:
- Article
AD-ASGKA - authenticated dynamic protocols for asymmetric group key agreement.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 11, p. 1340, doi. 10.1002/sec.1420
- By:
- Publication type:
- Article
Cryptanalysis of a certificateless aggregate signature scheme.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 11, p. 1353, doi. 10.1002/sec.1421
- By:
- Publication type:
- Article
Efficient chosen ciphertext secure identity-based encryption against key leakage attacks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 11, p. 1417, doi. 10.1002/sec.1429
- By:
- Publication type:
- Article
User-friendly random-grid-based visual secret sharing for general access structures.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 10, p. 966, doi. 10.1002/sec.1392
- By:
- Publication type:
- Article
A secure white-box SM4 implementation.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 10, p. 996, doi. 10.1002/sec.1394
- By:
- Publication type:
- Article
Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 10, p. 1016, doi. 10.1002/sec.1396
- By:
- Publication type:
- Article
Tweakable parallel OFB mode of operation with delayed thread synchronization.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 10, p. 1119, doi. 10.1002/sec.1404
- By:
- Publication type:
- Article
A survey of lightweight stream ciphers for embedded systems.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 10, p. 1226, doi. 10.1002/sec.1399
- By:
- Publication type:
- Article
A symmetric key-based pre-authentication protocol for secure handover in mobile WiMAX networks.
- Published in:
- Journal of Supercomputing, 2016, v. 72, n. 7, p. 2734, doi. 10.1007/s11227-015-1581-y
- By:
- Publication type:
- Article
Another look at normal approximations in cryptanalysis.
- Published in:
- Journal of Mathematical Cryptology, 2016, v. 10, n. 2, p. 69, doi. 10.1515/jmc-2016-0006
- By:
- Publication type:
- Article
Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier.
- Published in:
- Journal of Mathematical Cryptology, 2016, v. 10, n. 2, p. 101, doi. 10.1515/jmc-2014-0044
- By:
- Publication type:
- Article
Quantum Private Query Protocol Based on Two Non-Orthogonal States.
- Published in:
- Entropy, 2016, v. 18, n. 5, p. 163, doi. 10.3390/e18050163
- By:
- Publication type:
- Article
Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 8, p. 4485, doi. 10.1007/s11042-015-2487-7
- By:
- Publication type:
- Article
A coding and substitution frame based on hyper-chaotic systems for secure communication.
- Published in:
- Nonlinear Dynamics, 2016, v. 84, n. 2, p. 833, doi. 10.1007/s11071-015-2530-2
- By:
- Publication type:
- Article
MODELLING OF HAZARDS EFFECT ON SAFETY INTEGRITY OF OPEN TRANSMISSION SYSTEMS.
- Published in:
- Computing & Informatics, 2016, v. 35, n. 2, p. 470
- By:
- Publication type:
- Article
Limits on the Usefulness of Random Oracles.
- Published in:
- Journal of Cryptology, 2016, v. 29, n. 2, p. 283, doi. 10.1007/s00145-014-9194-9
- By:
- Publication type:
- Article
Random-Resistor-Random-Temperature Kirchhoff-Law-Johnson-Noise (RRRT-KLJN) Key Exchange.
- Published in:
- Metrology & Measurement Systems, 2016, v. 23, n. 1, p. 3, doi. 10.1515/mms-2016-0007
- By:
- Publication type:
- Article
Pure spatial rich model features for digital image steganalysis.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 5, p. 2897, doi. 10.1007/s11042-015-2521-9
- By:
- Publication type:
- Article
A pseudorandom number generator based on piecewise logistic map.
- Published in:
- Nonlinear Dynamics, 2016, v. 83, n. 4, p. 2373, doi. 10.1007/s11071-015-2488-0
- By:
- Publication type:
- Article
Curvelets-based ECG steganography for data security.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2016, v. 52, n. 4, p. 283, doi. 10.1049/el.2015.3218
- By:
- Publication type:
- Article
Selectively chosen ciphertext security in threshold public-key encryption.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 3, p. 189, doi. 10.1002/sec.417
- By:
- Publication type:
- Article
Anonymous communication in overlay networks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 3, p. 229, doi. 10.1002/sec.539
- By:
- Publication type:
- Article
Implementation Theoretical Information Protocol for Public Distribution Cryptology Keys.
- Published in:
- Serbian Journal of Electrical Engineering, 2016, v. 13, n. 1, p. 21, doi. 10.2298/SJEE1601021T
- By:
- Publication type:
- Article
Cryptanalysis of a robust key agreement based on public key authentication.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 1, p. 19, doi. 10.1002/sec.1373
- By:
- Publication type:
- Article
Biclique cryptanalysis of MIBS-80 and PRESENT-80 block ciphers.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 1, p. 27, doi. 10.1002/sec.1375
- By:
- Publication type:
- Article
CONSTRUCTING OF MINIMAX CLASS OF PERFECT BINARY ARRAYS OF ORDER N = 6 FOR MULTI-CHANNEL CRYPTOGRAPHIC INFORMATION TRANSFER SYSTEM.
- Published in:
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2016, v. 6, n. 1, p. 38
- By:
- Publication type:
- Article
Design and Development of Layered Security: Future Enhancements and Directions in Transmission.
- Published in:
- Sensors (14248220), 2016, v. 16, n. 1, p. 37, doi. 10.3390/s16010037
- By:
- Publication type:
- Article
Cryptanalysis and Improvement of a Mobile Dynamic ID Authenticated Key Agreement Scheme Based on Chaotic Maps.
- Published in:
- Wireless Personal Communications, 2015, v. 85, n. 4, p. 2141, doi. 10.1007/s11277-015-2896-y
- By:
- Publication type:
- Article
Lattice approach to video steganography.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2015, v. 23, n. Sup.1, p. 2074, doi. 10.3906/elk-1302-21
- By:
- Publication type:
- Article
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs.
- Published in:
- Journal of Mathematical Cryptology, 2015, v. 9, n. 4, p. 215, doi. 10.1515/jmc-2014-0031
- By:
- Publication type:
- Article
Detection of motion vector based video steganography.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 23, p. 10479, doi. 10.1007/s11042-014-2181-1
- By:
- Publication type:
- Article
Cryptanalysis of a secure chaotic map based block cryptosystem with application to camera sensor networks.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 23, p. 10873, doi. 10.1007/s11042-014-2211-z
- By:
- Publication type:
- Article
Cryptanalysis and provable improvement of a chaotic maps-based mobile dynamic ID authenticated key agreement scheme.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 17, p. 2981, doi. 10.1002/sec.1225
- By:
- Publication type:
- Article
Identity-based universal re-encryption for mixnets.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 17, p. 2992, doi. 10.1002/sec.1226
- By:
- Publication type:
- Article
3S: three-signature path authentication for BGP security.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 17, p. 3002, doi. 10.1002/sec.1227
- By:
- Publication type:
- Article
A novel weighted threshold secret image sharing scheme<sup>†</sup>.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 17, p. 3083, doi. 10.1002/sec.1233
- By:
- Publication type:
- Article
A secure and privacy-preserving event reporting scheme for vehicular Ad Hoc networks.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 17, p. 3271, doi. 10.1002/sec.1251
- By:
- Publication type:
- Article
Construction of resilient Boolean functions with high nonlinearity and good algebraic degree.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 16, p. 2909, doi. 10.1002/sec.1218
- By:
- Publication type:
- Article
On the eigenvalue and Shannon's entropy of finite length random sequences.
- Published in:
- Complexity, 2015, v. 21, n. 2, p. 154, doi. 10.1002/cplx.21587
- By:
- Publication type:
- Article
High payload image steganography with minimum distortion based on absolute moment block truncation coding.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 21, p. 9117, doi. 10.1007/s11042-014-2059-2
- By:
- Publication type:
- Article
Image steganography based on subsampling and compressive sensing.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 21, p. 9191, doi. 10.1007/s11042-014-2076-1
- By:
- Publication type:
- Article
Steganographic algorithm based on randomization of DCT kernel.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 21, p. 9207, doi. 10.1007/s11042-014-2077-0
- By:
- Publication type:
- Article
Novel steganographic method based on generalized K-distance N-dimensional pixel matching.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 21, p. 9623, doi. 10.1007/s11042-014-2140-x
- By:
- Publication type:
- Article