Suggested Topics within your search.
Suggested Topics within your search.
Cryptography
55
Internet of things
17
Network security
14
Public key cryptography
13
Authentication
12
TK Electrical engineering. Electronics Nuclear engineering
11
QA75 Electronic computers. Computer science
10
Quantum cryptography
10
Security
10
Security of data
8
Block-chain
7
Blockchain
7
Digital storage
7
security
7
Information management
6
blockchain
6
Computer security
5
Data privacy
5
Efficiency
5
Encryption
5
Quantum optics
5
Trusted computing
5
computer security
5
Cloud computing
4
Coding theory & cryptology
4
Cyber security
4
Cybersecurity
4
Field programmable gate arrays (FPGA)
4
Hardware architecture
4
Hash functions
4
-
5521Published 2021“... of elliptic curves to solve practical problems; as examples, we can mention cryptography, integer...”
Get full text
Get full text
Get full text
-
5522by Kirsten, Johan Frederik“... that depends on cryptography to issue new units instead of depending on government decree like fiat currencies...”
Published 2020
Get full text
Get full text
-
5523by Sun, Wenhai“... research that often relies on cryptography and concentrates on algorithmic design and theoretical proof...”
Published 2018
Get full text
Others -
5524by Tomescu Nicolescu, Ioan Alin.“..., cryptography is constantly plagued by two simple problems: keeping secret keys secret and making public keys...”
Published 2020
Get full text
Others -
5525by Jacobi, Daniel“... is also based on this encryption scheme. To secure communication more efficient symmetric cryptography...”
Published 2016
Get full text
Get full text
Others -
5526by Alessandro Biondi, Daniel Casini, Giorgiomaria Cicero, Niccolo Borgioli, Giorgio Buttazzo, Gaetano Patti, Luca Leonardi, Lucia Lo Bello, Marco Solieri, Paolo Burgio, Ignacio Sanudo Olmedo, Angelo Ruocco, Luca Palazzi, Marko Bertogna, Alessandro Cilardo, Nicola Mazzocca, Antonino Mazzeo“..., and the management of field-programmable gate arrays (FPGA) to provide efficient implementations for cryptography...”
Published 2021-01-01
Get full text
Article -
5527
-
5528by Günther, Felix“..., cryptography is protecting our interactions today when we read emails or do banking over the Internet, withdraw...”
Published 2018
Get full text
Get full text
Others -
5529by Georgiades, Andrew“... are cryptography and authentication. Cryptography allows the transmitted data to be scrambled in an undecipherable...”
Published 2011
Get full text
-
5530
Get full text
Others -
5531“..., computational heavy public key and symmetric key cryptography algorithms (e.g., RSA and AES) may not be suitable...”
Get full text
Others -
5532Comptage de points de courbes hyperelliptiques en grande caractéristique : algorithmes et complexitéby Abelard, Simon“..., avec des applications en cryptographie, en géométrie arithmétique et pour les codes correcteurs. Dans...”
Published 2018
Get full text
-
5533
Get full text
Others -
5534by Ahlfors, Andreas“... solutions in the forms of WEP, WPA and WPA2 are also reviewed. In conclusion quantum cryptography, which...”
Published 2008
Get full text
Others -
5535by Yuri I. Petrenko“... of cryptography. This paper presents a method of automatic separation of vowels and consonants in Russian texts...”
Published 2018-03-01
Get full text
Article -
5536
-
5537“... LightWeight Cryptography) competition and it provides not only data confidentiality but also data...”
Get full text
Article -
5538by Rafael H. Moraes Pereira“... and authenticate in the Internet - that could work with the State's official structure of cryptography and digital...”
Published 2010-12-01
Get full text
Article -
5539by Natalija B. Jelenković“..., cryptography, military psychology, air force, military-technical and military information science...”
Published 2010-10-01
Get full text
Article -
5540“... is applied to web services is to use public-key cryptography techniques. The attack can be a reconnaissance...”
Get full text
Article