Showing 5,521 - 5,540 results of 5,910 for search '"cryptography"', query time: 1.02s Refine Results
  1. 5521
    Published 2021
    ... of elliptic curves to solve practical problems; as examples, we can mention cryptography, integer...
    Get full text
    Get full text
    Get full text
  2. 5522
    by Kirsten, Johan Frederik
    Published 2020
    ... that depends on cryptography to issue new units instead of depending on government decree like fiat currencies...
    Get full text
    Get full text
  3. 5523
    by Sun, Wenhai
    Published 2018
    ... research that often relies on cryptography and concentrates on algorithmic design and theoretical proof...
    Get full text
    Others
  4. 5524
    by Tomescu Nicolescu, Ioan Alin.
    Published 2020
    ..., cryptography is constantly plagued by two simple problems: keeping secret keys secret and making public keys...
    Get full text
    Others
  5. 5525
    by Jacobi, Daniel
    Published 2016
    ... is also based on this encryption scheme. To secure communication more efficient symmetric cryptography...
    Get full text
    Get full text
    Others
  6. 5526
  7. 5527
  8. 5528
    by Günther, Felix
    Published 2018
    ..., cryptography is protecting our interactions today when we read emails or do banking over the Internet, withdraw...
    Get full text
    Get full text
    Others
  9. 5529
    by Georgiades, Andrew
    Published 2011
    ... are cryptography and authentication. Cryptography allows the transmitted data to be scrambled in an undecipherable...
    Get full text
  10. 5530
    ... applications like Cryptography, lottery, and some academic requirements, etc., reproducibility is a very...
    Get full text
    Others
  11. 5531
    by Sheng-Hui Chen, 陳聖輝
    Published 2007
    ..., computational heavy public key and symmetric key cryptography algorithms (e.g., RSA and AES) may not be suitable...
    Get full text
    Others
  12. 5532
    by Abelard, Simon
    Published 2018
    ..., avec des applications en cryptographie, en géométrie arithmétique et pour les codes correcteurs. Dans...
    Get full text
  13. 5533
    ... method of public key cryptography to the real world applicaticable cryptographic scheme. In a recent...
    Get full text
    Others
  14. 5534
    by Ahlfors, Andreas
    Published 2008
    ... solutions in the forms of WEP, WPA and WPA2 are also reviewed. In conclusion quantum cryptography, which...
    Get full text
    Others
  15. 5535
    by Yuri I. Petrenko
    Published 2018-03-01
    ... of cryptography. This paper presents a method of automatic separation of vowels and consonants in Russian texts...
    Get full text
    Article
  16. 5536
  17. 5537
    by BoSun Park, Seog Chung Seo 
    Published 2021-03-01
    ... LightWeight Cryptography) competition and it provides not only data confidentiality but also data...
    Get full text
    Article
  18. 5538
    by Rafael H. Moraes Pereira
    Published 2010-12-01
    ... and authenticate in the Internet - that could work with the State's official structure of cryptography and digital...
    Get full text
    Article
  19. 5539
    by Natalija B. Jelenković
    Published 2010-10-01
    ..., cryptography, military psychology, air force, military-technical and military information science...
    Get full text
    Article
  20. 5540
    by Ari Muzakir, Ahmad Ashari
    Published 2012-01-01
    ... is applied to web services is to use public-key cryptography techniques. The attack can be a reconnaissance...
    Get full text
    Article