Works matching DE "CRYPTOGRAPHY research"
1
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 925, doi. 10.2298/CSIS130919057C
- Chin-Ling Chen;
- Woei-Jiunn Tsaur;
- Yu-Yi Chen;
- Yao-Chung Chang
- Article
2
- Computational Linguistics, 2014, v. 40, n. 2, p. 403, doi. 10.1162/COLI_a_00176
- Ching-Yun Chang;
- Clark, Stephen
- Article
3
- Journal of Cryptology, 2016, v. 29, n. 2, p. 283, doi. 10.1007/s00145-014-9194-9
- Haitner, Iftach;
- Omri, Eran;
- Zarosim, Hila
- Article
4
- Journal of Cryptology, 2009, v. 22, n. 2, p. 227, doi. 10.1007/s00145-008-9027-9
- Article
5
- JETP Letters, 2009, v. 88, n. 9, p. 636, doi. 10.1134/S0021364008210194
- Shurupov, A. P.;
- Kulik, S. P.
- Article
6
- Chinese Journal of Liquid Crystal & Displays, 2015, v. 30, n. 1, p. 151, doi. 10.3788/YJYXS20153001.0151
- LIU Jiu-wen;
- PAN Feng;
- LI Jun
- Article
7
- Science-Based Technologies, 2014, v. 22, n. 2, p. 196, doi. 10.18372/2310-5461.22.6819
- Чунарьова, А. В.;
- Потапенко, Є. О.
- Article
8
- Science-Based Technologies, 2014, v. 22, n. 2, p. 187, doi. 10.18372/2310-5461.22.6817
- Петренко, А. Б.;
- Шматок, О. С.;
- Шматок, С. А.;
- Агеєнко, Є. О.
- Article
9
- Science-Based Technologies, 2014, v. 22, n. 2, p. 183, doi. 10.18372/2310-5461.22.6815
- Meleshko, O. O.;
- Kovalskiy, O. O.
- Article
10
- Advances in Electrical & Electronic Engineering, 2013, v. 11, n. 2, p. 94, doi. 10.15598/aeee.v11i2.762
- FRANEKOVA, Maria;
- VYROSTKO, Marek;
- LULEY, Peter
- Article
11
- Computer Journal, 2014, v. 57, n. 10, p. 1570, doi. 10.1093/comjnl/bxt097
- Article
12
- Computer Journal, 2014, v. 57, n. 10, p. 1460, doi. 10.1093/comjnl/bxt069
- López-García, Lourdes;
- Perez, Luis J. Dominguez;
- Rodríguez-Henríquez, Francisco
- Article
13
- Computer Journal, 2014, v. 57, n. 10, p. 1472, doi. 10.1093/comjnl/bxt076
- Cui, Hui;
- Mu, Yi;
- Au, Man Ho
- Article
14
- Journal of Modern Optics, 2005, v. 52, n. 16, p. 2177, doi. 10.1080/09500340500275298
- Article
15
- InfoM, 2013, n. 48, p. 21
- Stanisavljević, Žarko;
- Stanisavljević, Jelena
- Article
16
- Journal of Applied Computer Science & Mathematics, 2015, n. 20, p. 13
- Kumar, B. Ravi;
- Sekhar, A. Chandra;
- Naidu, G. Appala
- Article
17
- Journal of Applied Computer Science & Mathematics, 2015, n. 20, p. 9
- Article
18
- IETE Journal of Research, 2014, v. 60, n. 3, p. 218, doi. 10.1080/03772063.2014.901480
- Zhang, Mingwu;
- Morozov, Kirill;
- Takagi, Tsuyoshi
- Article
19
- Quantum Information Processing, 2013, v. 12, n. 8, p. 2655, doi. 10.1007/s11128-013-0554-4
- Zhang, Ke-Jia;
- Zhang, Wei-Wei;
- Li, Dan
- Article
20
- Journal of Research of the National Institute of Standards & Technology, 2015, v. 120, p. 11, doi. 10.6028/jres.120.002
- Moody, Dustin;
- Peralta, Rene;
- Perlner, Ray;
- Regenscheid, Andrew;
- Roginsky, Allen;
- Chen, Lily
- Article
21
- Journal of Research of the National Institute of Standards & Technology, 2015, v. 120, p. 11, doi. 10.6028/jres.120.002
- Moody, Dustin;
- Peralta, Rene;
- Perlner, Ray;
- Regenscheid, Andrew;
- Roginsky, Allen;
- Chen, Lily
- Article
22
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 259, doi. 10.18372/2225-5036.20.7553
- Article
23
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 248, doi. 10.18372/2225-5036.20.7551
- Article
24
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 242, doi. 10.18372/2225-5036.20.7550
- Rudnytskyy, V.;
- Melnyk, O.;
- Scherbyna, V.;
- Myronyuk, T.
- Article
25
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 176, doi. 10.18372/2225-5036.20.7305
- Article
26
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 159, doi. 10.18372/2225-5036.20.7302
- Luzhetskiy, V.;
- Gorbenko, I.
- Article
27
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 143, doi. 10.18372/2225-5036.20.7299
- Babenko, V.;
- Melnyk, O.;
- Stabetska, T.
- Article
28
- Journal of Circuits, Systems & Computers, 2009, v. 18, n. 2, p. 295, doi. 10.1142/S0218126609005071
- Nedjah, Nadia;
- Mourelle, Luiza De Macedo
- Article
29
- Journal of Applied Security Research, 2010, v. 5, n. 3, p. 306, doi. 10.1080/19361610.2010.484833
- Article
30
- International Journal of Number Theory, 2009, v. 5, n. 2, p. 311, doi. 10.1142/S1793042109002122
- Article
31
- Entropy, 2016, v. 18, n. 5, p. 163, doi. 10.3390/e18050163
- Yan Chang;
- Shibin Zhang;
- Guihua Han;
- Zhiwei Sheng;
- Lili Yan;
- Jinxin Xiong
- Article
32
- Journal of Electronic Testing, 2013, v. 29, n. 2, p. 193, doi. 10.1007/s10836-013-5369-9
- Das, Amitabh;
- Rolt, Jean;
- Ghosh, Santosh;
- Seys, Stefaan;
- Dupuis, Sophie;
- Natale, Giorgio;
- Flottes, Marie-Lise;
- Rouzeyre, Bruno;
- Verbauwhede, Ingrid
- Article
33
- Knowledge & Information Systems, 2012, v. 30, n. 2, p. 405, doi. 10.1007/s10115-011-0395-3
- Yakut, Ibrahim;
- Polat, Huseyin
- Article
34
- Scientometrics, 2015, v. 105, n. 1, p. 179, doi. 10.1007/s11192-015-1661-z
- Article
35
- Journal of Zhengzhou University of Light Industry, Natural Science Edition, 2014, v. 29, n. 6, p. 73, doi. 10.3969/j.issn.2095-476X.2014.06.016
- Article
36
- Metrology & Measurement Systems, 2016, v. 23, n. 1, p. 3, doi. 10.1515/mms-2016-0007
- Kish, Laszlo B.;
- Granqvist, Claes G.
- Article
37
- International Journal of Electronics & Telecommunications, 2022, v. 68, n. 3, p. 463, doi. 10.24425/ijet.2022.139890
- Dzierzkowski, Łukasz;
- Wroński, Michał
- Article
38
- Acta Informatica, 2017, v. 54, n. 5, p. 521, doi. 10.1007/s00236-016-0270-5
- Gu, Ke;
- Jia, Weijia;
- Wang, Guojun;
- Wen, Sheng
- Article
39
- Information Security Journal: A Global Perspective, 2014, v. 23, n. 1/2, p. 1, doi. 10.1080/19393555.2013.877541
- Dara, Mona;
- Manochehri, Kooroush
- Article
40
- Complexity, 2015, v. 21, n. 2, p. 154, doi. 10.1002/cplx.21587
- Liu, Lingfeng;
- Hu, Hanping;
- Deng, Yashuang;
- Miao, Suoxia
- Article
41
- Electronics Letters (Wiley-Blackwell), 2016, v. 52, n. 4, p. 283, doi. 10.1049/el.2015.3218
- Article
42
- Electronics Letters (Wiley-Blackwell), 2014, v. 50, n. 22, p. 1604, doi. 10.1049/el.2014.1559
- Jiangsha Ma;
- Xiangyu Li;
- Moyang Wang
- Article
43
- Turkish Journal of Electrical Engineering & Computer Sciences, 2015, v. 23, n. Sup.1, p. 2074, doi. 10.3906/elk-1302-21
- ÜNLÜ, Onur;
- KARACAN, Hacer
- Article
44
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2805, doi. 10.3969/j.issn.1001-3695.2013.09.062
- ZHANG Guang-bin;
- YUE Yun-tian;
- ZHANG Chuan-fu
- Article
45
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2780, doi. 10.3969/j.issn.1001-3695.2013.09.055
- GAO Zhan-zhan;
- TANG Guang-ming;
- DAI Jia-ming
- Article
46
- InSight: Rivier Academic Journal, 2012, v. 8, n. 2, p. 1
- Article
47
- Serbian Journal of Electrical Engineering, 2016, v. 13, n. 1, p. 21, doi. 10.2298/SJEE1601021T
- Tatović, Milomir;
- Adamović, Saša;
- Milosavljević, Milan
- Article
48
- International Journal of Distributed Sensor Networks, 2009, v. 5, n. 1, p. 14, doi. 10.1080/15501320802505986
- Han, Jihong;
- Zhou, Zhiyong;
- Wang, Yadi
- Article
49
- International Journal of Distributed Sensor Networks, 2009, v. 5, n. 1, p. 28, doi. 10.1080/15501320802520613
- Zhang, Jianhong;
- Yang, Yixian;
- Niu, Xinxin
- Article
50
- International Journal of Distributed Sensor Networks, 2009, v. 5, n. 1, p. 29, doi. 10.1080/15501320802520639
- Zhang, Jianhong;
- Ji, Cheng;
- Geng, Qin
- Article