-
1by Hutchinson, Aaron“...<p> Elliptic curves have played a large role in modern cryptography. Most notably, the Elliptic...”
Published 2019
Get full text
-
2by Lucas, John Patrick“... (cFS). A cFS cryptography library, named Crypto, was developed to implement the SDLS-EP procedures...”
Published 2017
Get full text
-
3by Enos, Graham“... explore some applications of elliptic curve and pairing-based cryptography wherein the added security...”
Published 2013
Get full text
-
4by Ghosh, Debeshi D.“... an embedded image (watermark) using the XOR method of symmetric key cryptography. Encryption is then followed...”
Published 2017
Get full text
-
5by Al Khulaif, Husain H.“... decisions taken in the design of these cryptographic primitives through various ages of cryptography...”
Published 2014
Get full text
-
6by Gudapati, Supriya“... different approach called hybrid cryptography in our proposed scheme. Enhanced Adaptive Acknowledgment...”
Published 2015
Get full text
-
7by Tambasco, Michael J.“...., biometric equipment, quantum resistant cryptography, and the abstract realm, i.e., legal considerations...”
Published 2015
Get full text
-
8by Suwannarath, Songluk“... knowledge protocol and a session key cryptography into the formation phase, and modify packets that were...”
Published 2016
Get full text
-
9by Wadhwa, Preeti H.“... of the gradient based routing and cryptography in a network. For implementation of the proposed algorithm...”
Published 2015
Get full text
-
10by Gero, Kimberly A.“...>. This topic is of great interest and importance to cryptography. Cryptographic protocol analysis...”
Published 2015
Get full text
-
11by Batson, Scott Christopher“... number field. Many recent developments in lattice-based cryptography are centered around the use of ideal...”
Published 2015
Get full text
-
12by Castro, Jose M“... in spectral phase encoding/decoding and optical cryptography are presented....”
Published 2006
Get full text
-
13by Muralidharan, Sreraman“...<p> Despite the tremendous progress of quantum cryptography, efficient quantum communication over...”
Published 2018
Get full text
-
14by McCusker, James P.“... of cryptography, computer security, semantic web services, semantic publishing, library science, and provenance...”
Published 2015
Get full text
-
15by Tierney, Matthew Ryan“... of public key cryptography.</p><p> In the third part of this thesis, we propose a new system, Compass...”
Published 2014
Get full text
-
16by Xu, Zhiheng“... theory and cryptography to develop secure mechanisms for different layers. For control systems, we use a...”
Published 2019
Get full text