Showing 1 - 17 results of 17 for search '"cryptography"', query time: 0.22s Refine Results
  1. 1
  2. 2
    by Roberto Narváez
    Published 2012-01-01
    ... is to contribute to the knowledge of Mexican cryptography in the 20th century. In particular it seeks to make...
    Get full text
    Article
  3. 3
  4. 4
  5. 5
    ... it is one of the most interesting topics in the communities related to security. Cryptography is the one...
    Get full text
    Article
  6. 6
    by Henry Chimal-Dzul, C. A. López-Andrade
    Published 2018-03-01
    ... Because of its interesting applications in coding theory, cryptography, and algebraic combinatoris...
    Get full text
    Article
  7. 7
    ... of cryptography. The results of a comparative study of the binary strings generated by this HRNG and of those...
    Get full text
    Article
  8. 8
    by Ricardo Villanueva Polanco
    Published 2014-01-01
    ... implementación eficiente de estos métodos con parámetros reales.   Abstract Elliptic Curve Cryptography...
    Get full text
    Article
  9. 9
    ... criptografía de clave pública con curvas elípticas (ECC = Elliptic Curve Cryptography) como una alternativa de...
    Get full text
    Article
  10. 10
    ... criptografía de clave pública con curvas elípticas (ECC = Elliptic Curve Cryptography) como una alternativa de...
    Get full text
    Article
  11. 11
    by Guillermo Morales-Luna
    Published 2011-07-01
    ... implications in hard problems and in cryptography. Finally, some current implementation strategies are outlined...
    Get full text
    Article
  12. 12
    by Rafael H. Moraes Pereira
    Published 2010-12-01
    ... and authenticate in the Internet - that could work with the State's official structure of cryptography and digital...
    Get full text
    Article
  13. 13
    by Fernández Ruiz, Pedro Javier
    Published 2016
    ... asymmetric cryptography. This is not a problem if the message submission rate is low and destination nodes...
    Get full text
    Doctoral Thesis
  14. 14
  15. 15
    ... such as cryptography and bitcoin, and the different areas of application. In the second chapter, the development...
    Get full text
    Others
  16. 16
    by Bernal Bernabé, Jorge
    Published 2015
    ... ``International Conference on Security and Cryptography'' (SECRYPT), en el artículo ``Towards an Authorization...
    Get full text
    Doctoral Thesis
  17. 17
    by Gil Pérez, Manuel
    Published 2015
    ... in exchanging alerts based on public key cryptography. Proposal about the definition of X.509 certificates under...
    Get full text
    Doctoral Thesis