-
1
-
2by Roberto Narváez“... is to contribute to the knowledge of Mexican cryptography in the 20th century. In particular it seeks to make...”
Published 2012-01-01
Get full text
Article -
3
-
4by Fernández Asencios, Nery BenjamínSubjects: “...Cryptography...”
Published 2021
Get full text
Others -
5“... it is one of the most interesting topics in the communities related to security. Cryptography is the one...”
Get full text
Article -
6“... Because of its interesting applications in coding theory, cryptography, and algebraic combinatoris...”
Get full text
Article -
7by Osvaldo Skliar, Ricardo E. Monge, Víctor Medina, Sherry Gapper, Guillermo Oviedo“... of cryptography. The results of a comparative study of the binary strings generated by this HRNG and of those...”
Published 2011-07-01
Get full text
Article -
8by Ricardo Villanueva Polanco“... implementación eficiente de estos métodos con parámetros reales. Abstract Elliptic Curve Cryptography...”
Published 2014-01-01
Get full text
Article -
9“... criptografía de clave pública con curvas elípticas (ECC = Elliptic Curve Cryptography) como una alternativa de...”
Get full text
Article -
10“... criptografía de clave pública con curvas elípticas (ECC = Elliptic Curve Cryptography) como una alternativa de...”
Get full text
Article -
11by Guillermo Morales-Luna“... implications in hard problems and in cryptography. Finally, some current implementation strategies are outlined...”
Published 2011-07-01
Get full text
Article -
12by Rafael H. Moraes Pereira“... and authenticate in the Internet - that could work with the State's official structure of cryptography and digital...”
Published 2010-12-01
Get full text
Article -
13by Fernández Ruiz, Pedro Javier“... asymmetric cryptography. This is not a problem if the message submission rate is low and destination nodes...”
Published 2016
Get full text
Doctoral Thesis -
14“... the present research, for which we will analyze the legal framework, electronic government, cryptography...”
Get full text
Get full text
Others -
15“... such as cryptography and bitcoin, and the different areas of application. In the second chapter, the development...”
Get full text
Others -
16by Bernal Bernabé, Jorge“... ``International Conference on Security and Cryptography'' (SECRYPT), en el artículo ``Towards an Authorization...”
Published 2015
Get full text
Doctoral Thesis -
17by Gil Pérez, Manuel“... in exchanging alerts based on public key cryptography. Proposal about the definition of X.509 certificates under...”
Published 2015
Get full text
Doctoral Thesis