Erscheinungsjahr
Fach
Format
Lizenz
TIB-Lesesaalbestand
LUH-Institutsbestand
Synonyme wurden verwendet für: Geheimschrift
Suche ohne Synonyme: keywords:(Geheimschrift)
Verwendete Synonyme:
- cryptography
-
Optimal and Player-Replaceable Consensus with an Honest Majority
Freier ZugriffDSpace@MIT | 2017|Schlagwörter: Cryptography -
Benford’s law in the Beale ciphers
Taylor & Francis Verlag | 2021|Schlagwörter: historical cryptography -
Towards Isogeny-Based Password-Authenticated Key Establishment
Freier ZugriffDOAJ | 2020|Schlagwörter: post-quantum cryptography, isogeny-based cryptography -
Preservers of cover numbers and independence numbers of undirected graphs
British Library Conference Proceedings | 2013|Schlagwörter: Cryptography -
Comments on “An improved secure and efficient password and chaos-based two-party key agreement protocol”
Online Contents | 2016|Schlagwörter: Cryptography -
Designing chaotic S-boxes based on time-delay chaotic system
Online Contents | 2013|Schlagwörter: Cryptography -
Finding Roots in GF(p^n) with the Successive Resultant Algorithm
Freier ZugriffBASE | 2014|Schlagwörter: Cryptography -
Computation and Simulation of Langevin Stochastic Differential Equation
British Library Conference Proceedings | 2013|Schlagwörter: Cryptography -
Cryptography using multiple one-dimensional chaotic maps
Elsevier | 2004|Schlagwörter: Discrete chaotic cryptography (DCC), Secret-key cryptography -
The History Of The Total Chromatic Number Conjecture
British Library Conference Proceedings | 2013|Schlagwörter: Cryptography -
Dynamic Redundancy Bit Allocation And Packet Size To Increase Throughput In Noisy Real Time Video Wireless Transmission
British Library Conference Proceedings | 2013|Schlagwörter: Cryptography -
Expected Time To Detection Of Interaction Faults
British Library Conference Proceedings | 2013|Schlagwörter: Cryptography -
An efficient certificateless undeniable signature scheme
Taylor & Francis Verlag | 2015|Schlagwörter: certificateless cryptography, identity-based cryptography -
Compact Adaptively Secure ABE for $${\textsf {NC}}^{1}$$ from k-Lin
Online Contents | 2019|Schlagwörter: Public-key cryptography -
Applying higher stength combinatorial criteria to test case prioritization: a case study
British Library Conference Proceedings | 2013|Schlagwörter: Cryptography -
Roaming Regions for Delaunay Nodes
British Library Conference Proceedings | 2013|Schlagwörter: Cryptography -
Expression and Computation of Generalized Stirling Numbers
British Library Conference Proceedings | 2013|Schlagwörter: Cryptography -
Application of Recursive Algorithm on Shamir's Scheme Reconstruction for Cheating Detection and Identification
Freier ZugriffBASE | 2022|Schlagwörter: Cryptography -
A novel method for designing S-box based on chaotic map and Teaching–Learning-Based Optimization
Online Contents | 2016|Schlagwörter: Chaos-based cryptography -
On the complexity of the discrete logarithm and Diffie–Hellman problems
Elsevier | 2004|Schlagwörter: Cryptography -
Certificateless signature: a new security model and an improved generic construction
Online Contents | 2006|Schlagwörter: Certificateless cryptography -
“I am now their father too”: the multi-layered meanings of family letters from the Jewish Maquis in France during the second world war
Freier ZugriffTaylor & Francis Verlag | 2023|Schlagwörter: cryptography -
Multi-authority attribute-based encryption with honest-but-curious central authority
Taylor & Francis Verlag | 2012|Schlagwörter: pairing-based cryptography -
Improving algebraic attacks on stream ciphers based on linear feedback shift register over $$\mathbb {F}_{2^k}$$
Online Contents | 2016|Schlagwörter: Cryptography -
Elliptic Curves Cryptography for Lightweight Devices in IoT Systems
Springer Verlag | 2022|Schlagwörter: Cryptography, Elliptic curve cryptography -
Connected Balanced Subgraphs in Random Regular Multigraphs Under the Configuration Model
British Library Conference Proceedings | 2013|Schlagwörter: Cryptography -
Unifying Leakage Models: From Probing Attacks to Noisy Leakage
Online Contents | 2018|Schlagwörter: Leakage-resilient cryptography -
Provable security against generic attacks on stream ciphers
Freier ZugriffDeGruyter | 2023|Schlagwörter: symmetric-key cryptography, lightweight cryptography -
Certificateless signature: a new security model and an improved generic construction
Online Contents | 2006|Schlagwörter: Certificateless cryptography -
SPRING: a novel parallel chaos-based image encryption scheme
Online Contents | 2018|Schlagwörter: Cryptography -
Further Existence Results on Beautifully Ordered Balanced Incomplete Block Designs
British Library Conference Proceedings | 2013|Schlagwörter: Cryptography -
Security analysis of the pseudo-random bit generator based on multi-modal maps
Online Contents | 2017|Schlagwörter: Cryptography -
Using Abelian Varieties to Improve Pairing-Based Cryptography
Online Contents | 2008|Schlagwörter: Pairing-based cryptography, Elliptic curve cryptography -
Healthcare Internet of Things (HIoT) data security enhancement using blockchain technology
IOS Press | 2022|Schlagwörter: cryptography -
Some Notes on a Formal Algebraic Structure of Cryptology
Freier ZugriffDOAJ | 2021|Schlagwörter: cryptography -
On the Existance of Certain Circulant Weighing Matrices
British Library Conference Proceedings | 2013|Schlagwörter: Cryptography -
Compatibility Matrix Method
British Library Conference Proceedings | 2013|Schlagwörter: Cryptography -
Hash functions from superspecial genus-2 curves using Richelot isogenies
Freier ZugriffDOAJ | 2020|Schlagwörter: cryptography -
Group signatures and more from isogenies and lattices: generic, simple, and efficient
Freier ZugriffSpringer Verlag | 2023|Schlagwörter: Isogeny-based cryptography, Lattice-based cryptography, Post-quantum cryptography -
SPRING: a novel parallel chaos-based image encryption scheme
Online Contents | 2018|Schlagwörter: Cryptography -
Designing chaotic S-boxes based on time-delay chaotic system
Online Contents | 2013|Schlagwörter: Cryptography -
A novel method for designing S-box based on chaotic map and Teaching–Learning-Based Optimization
Online Contents | 2016|Schlagwörter: Chaos-based cryptography -
Trusted Computing with Addition Machines. I
Online Contents | 2017|Schlagwörter: homomorphic cryptography -
On the Dirac-type Conjecture for Anti-directed Hamiltonian Digraphs
British Library Conference Proceedings | 2012|Schlagwörter: Cryptography -
On k-Edge-Magic Cubic Graphs
British Library Conference Proceedings | 2012|Schlagwörter: Cryptography
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.