Showing 5,781 - 5,800 results of 5,910 for search '"cryptography"', query time: 0.70s Refine Results
  1. 5781
    by Rocha, Carlos Raphael
    Published 2016
    ... entanglement and quantum cryptography, as well as other examples. With linear superposition of waves...
    Get full text
    Others
  2. 5782
    by Barbosa, Jose Antônio Carrijo
    Published 2010
    ..., known as the identification problem, is well known in cryptography. However, the classical solutions...
    Get full text
  3. 5783
    by Alves, Vinícius de Morais
    Published 2011
    ... of information-theoretical security on [Mau93]. Unlike the usual approach in modern cryptography, the Maurer...
    Get full text
  4. 5784
    by Dreier, Jannik
    Published 2013
    ... by a non-expert, as the property is ensured through physical properties instead of complex cryptography...
    Get full text
  5. 5785
    by Rocha, Carlos Raphael
    Published 2016
    ... entanglement and quantum cryptography, as well as other examples. With linear superposition of waves...
    Get full text
    Others
  6. 5786
    ... of elliptic curve cryptography (ECC), non-clonable functions (PUF) and identity receipts. An ECC will assist...
    Get full text
    Others
  7. 5787
    by Filippov, Stanislav
    Published 2015
    ... in the GaAs matrix are proposed as building blocks for entangled photon sources for quantum cryptography...
    Get full text
    Get full text
    Doctoral Thesis
  8. 5788
    by Chen, Yiyang
    Published 2015
    ... importante pour les applications de la théorie des correcteurs et de la cryptographie. Dans ce mémoire, nous...
    Get full text
  9. 5789
    by Rocha, Carlos Raphael
    Published 2016
    ... entanglement and quantum cryptography, as well as other examples. With linear superposition of waves...
    Get full text
    Others
  10. 5790
    by Thé, George André Pereira
    Published 2016
    ... is the most advanced field. It permits two parties, named Alice and Bob, sharing a cryptography key through a...
    Get full text
  11. 5791
    by Possignolo, Rafael Trapani
    Published 2012
    ... interesting properties found on quantum cryptography, a complete cryptosystem seems intangible, specially...
    Get full text
    Others
  12. 5792
    Published 2000
    ... 3.3.1. --- Protected Agent States --- p.29 === Chapter 3.3.2. --- Mobile Cryptography --- p.30...
    Get full text
    Get full text
    Others
  13. 5793
    by Serafini, Marco
    Published 2010
    ...]. Furthermore, different from existing work on confidential BFT, HeterTrust uses only symmetric-key cryptography...
    Get full text
    Get full text
    Others
  14. 5794
    by Yuan-Ching Kuo, 郭源欽
    Published 2014
    ... intensive digital signal processing (DSP), image processing, fault-tolerant detection, and cryptography...
    Get full text
    Others
  15. 5795
    by Barra, Marcello Cavalcanti
    Published 2009
    ... cryptography. This case showed electronic government idea was not enough to explain what had happened in PKI...
    Get full text
  16. 5796
    by Lacerda, Felipe Gomes
    Published 2016
    ... vulnerable to so-called side-channel attacks. Cryptography is now used in an ever-increasing variety...
    Get full text
  17. 5797
    ... the two first development axes, including an RSA cryptography core and combinational and pipeline...
    Get full text
  18. 5798
    by Viera, Lucas Camponogara
    Published 2017
    ... phenomena such as Discord and Entanglement with Quantum Cryptography implementation, as example. The aim...
    Get full text
  19. 5799
    by Pham Sy, Lam
    Published 2012
    ...”, International Workshop on Coding and Cryptography, April 2011, Paris, France. (b) “Extended Non-Binary Low...
    Get full text
  20. 5800
    by Rafael Trapani Possignolo
    Published 2012
    ... some interesting properties found on quantum cryptography, a complete cryptosystem seems intangible...
    Get full text