Works matching DE "CRYPTOGRAPHY research"


Results: 203
    1
    2
    3
    4
    5
    6
    7
    8
    9

    ELLIPTIC CURVE CRYPTOGRAPHY.

    Published in:
    Science-Based Technologies, 2014, v. 22, n. 2, p. 183, doi. 10.18372/2310-5461.22.6815
    By:
    • Meleshko, O. O.;
    • Kovalskiy, O. O.
    Publication type:
    Article
    10
    11
    12

    A Pairing-Based Blind Signature E-Voting Scheme.

    Published in:
    Computer Journal, 2014, v. 57, n. 10, p. 1460, doi. 10.1093/comjnl/bxt069
    By:
    • López-García, Lourdes;
    • Perez, Luis J. Dominguez;
    • Rodríguez-Henríquez, Francisco
    Publication type:
    Article
    13
    14
    15
    16
    17
    18
    19
    20

    Report on Pairing-based Cryptography.

    Published in:
    Journal of Research of the National Institute of Standards & Technology, 2015, v. 120, p. 11, doi. 10.6028/jres.120.002
    By:
    • Moody, Dustin;
    • Peralta, Rene;
    • Perlner, Ray;
    • Regenscheid, Andrew;
    • Roginsky, Allen;
    • Chen, Lily
    Publication type:
    Article
    21

    Report on Pairing-based Cryptography.

    Published in:
    Journal of Research of the National Institute of Standards & Technology, 2015, v. 120, p. 11, doi. 10.6028/jres.120.002
    By:
    • Moody, Dustin;
    • Peralta, Rene;
    • Perlner, Ray;
    • Regenscheid, Andrew;
    • Roginsky, Allen;
    • Chen, Lily
    Publication type:
    Article
    22
    23
    24
    25
    26
    27
    28
    29

    BioCryptography.

    Published in:
    Journal of Applied Security Research, 2010, v. 5, n. 3, p. 306, doi. 10.1080/19361610.2010.484833
    By:
    • Gao, Qinghai
    Publication type:
    Article
    30
    31
    32

    Secure JTAG Implementation Using Schnorr Protocol.

    Published in:
    Journal of Electronic Testing, 2013, v. 29, n. 2, p. 193, doi. 10.1007/s10836-013-5369-9
    By:
    • Das, Amitabh;
    • Rolt, Jean;
    • Ghosh, Santosh;
    • Seys, Stefaan;
    • Dupuis, Sophie;
    • Natale, Giorgio;
    • Flottes, Marie-Lise;
    • Rouzeyre, Bruno;
    • Verbauwhede, Ingrid
    Publication type:
    Article
    33
    34
    35

    A chaotic block encryption algorithm.

    Published in:
    Journal of Zhengzhou University of Light Industry, Natural Science Edition, 2014, v. 29, n. 6, p. 73, doi. 10.3969/j.issn.2095-476X.2014.06.016
    By:
    • WEI Feng
    Publication type:
    Article
    36
    37
    38
    39
    40
    41
    42
    43

    Lattice approach to video steganography.

    Published in:
    Turkish Journal of Electrical Engineering & Computer Sciences, 2015, v. 23, n. Sup.1, p. 2074, doi. 10.3906/elk-1302-21
    By:
    • ÜNLÜ, Onur;
    • KARACAN, Hacer
    Publication type:
    Article
    44

    Wet-paper stego-coding based on cyclic-code.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2805, doi. 10.3969/j.issn.1001-3695.2013.09.062
    By:
    • ZHANG Guang-bin;
    • YUE Yun-tian;
    • ZHANG Chuan-fu
    Publication type:
    Article
    45

    Research on payload adaptive batch steganography.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2780, doi. 10.3969/j.issn.1001-3695.2013.09.055
    By:
    • GAO Zhan-zhan;
    • TANG Guang-ming;
    • DAI Jia-ming
    Publication type:
    Article
    46
    47
    48
    49
    50

    Designated-Verifier Chameleon Proxy Signature.

    Published in:
    International Journal of Distributed Sensor Networks, 2009, v. 5, n. 1, p. 29, doi. 10.1080/15501320802520639
    By:
    • Zhang, Jianhong;
    • Ji, Cheng;
    • Geng, Qin
    Publication type:
    Article