Erscheinungsjahr
Medientyp
Fach
Format
Lizenz
Sprache
Synonyme wurden verwendet für: Geheimschrift
Suche ohne Synonyme: keywords:(Geheimschrift)
Verwendete Synonyme:
- cryptography
-
A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack
Freier ZugriffDOAJ | 2019|Schlagwörter: lattice-based cryptography -
A family of weak keys in HFE and the corresponding practical key-recovery
Freier ZugriffDOAJ | 2012|Schlagwörter: multivariate cryptography -
Algebraic generalization of Diffie–Hellman key exchange
Freier ZugriffDOAJ | 2018|Schlagwörter: cryptography -
Analysis of a certain polycyclic-group-based cryptosystem
Freier ZugriffDOAJ | 2015|Schlagwörter: cryptography -
Analysis of a key exchange protocol based on tropical matrix algebra
Freier ZugriffDOAJ | 2018|Schlagwörter: cryptography -
An attack on disguised elliptic curves
Freier ZugriffDOAJ | 2008|Schlagwörter: public key cryptography -
An essay on the art of decyphering. In which is inserted a discourse of Dr. Wallis. Now first publish'd from his original manuscript in the publick library at Oxford. By John Davys, M. A. Rector of Castle-Ashby in Northamptonshire
NationallizenzGWLB - Gottfried Wilhelm Leibniz Bibliothek | 1737|Schlagwörter: Cryptography -
A new method of choosing primitive elements for Brezing–Weng families of pairing-friendly elliptic curves
Freier ZugriffDOAJ | 2015|Schlagwörter: pairing-based cryptography -
An exploration of affine group laws for elliptic curves
Freier ZugriffDOAJ | 2011|Schlagwörter: elliptic curve cryptography -
Another look at automated theorem-proving
Freier ZugriffDOAJ | 2007|Schlagwörter: public key cryptography -
Another look at automated theorem-proving II
Freier ZugriffDOAJ | 2012|Schlagwörter: public key cryptography -
Another look at non-standard discrete log and Diffie-Hellman problems
Freier ZugriffDOAJ | 2008|Schlagwörter: public-key cryptography -
Aperiodic logarithmic signatures
Freier ZugriffDOAJ | 2012|Schlagwörter: group theoretic cryptography -
A secure anonymous proxy signcryption scheme
Freier ZugriffDOAJ | 2017|Schlagwörter: identity-based cryptography -
A subexponential-time, polynomial quantum space algorithm for inverting the CM group action
Freier ZugriffDOAJ | 2020|Schlagwörter: isogeny-based cryptography -
A Summary of McEliece-Type Cryptosystems and their Security
Freier ZugriffDOAJ | 2007|Schlagwörter: public key cryptography,, code based cryptography, -
Better path-finding algorithms in LPS Ramanujan graphs
Freier ZugriffDOAJ | 2018|Schlagwörter: cryptography -
CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes
Freier ZugriffDOAJ | 2020|Schlagwörter: lattice based cryptography -
CLSM: COUPLE LAYERED SECURITY MODEL A HIGH-CAPACITY DATA HIDING SCHEME USING WITH STEGANOGRAPHY
Freier ZugriffDOAJ | 2017|Schlagwörter: cryptography -
Compact McEliece keys based on quasi-dyadic Srivastava codes
Freier ZugriffDOAJ | 2012|Schlagwörter: cryptography -
Compressive Imaging Encryption with Secret Sharing Metasurfaces
Wiley | 2022|Schlagwörter: visual cryptography -
Conventional Non‐Fluorescent Polymers: Unconventional Security Inks for Data Storage and Multidimensional Photonic Cryptography
Wiley | 2023|Schlagwörter: photonic cryptography -
Converting pairing-based cryptosystems from composite to prime order setting – A comparative analysis
Freier ZugriffDOAJ | 2018|Schlagwörter: pairing-based cryptography -
Cryptanalysing variants of Stickel's key agreement scheme
Freier ZugriffDOAJ | 2011|Schlagwörter: group-based cryptography -
Cryptanalysis of matrix conjugation schemes
Freier ZugriffDOAJ | 2014|Schlagwörter: group-based cryptography -
Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme
Freier ZugriffDOAJ | 2015|Schlagwörter: symmetric key cryptography -
Cryptanalysis of the MST3 public key cryptosystem
Freier ZugriffDOAJ | 2009|Schlagwörter: group theoretic cryptography -
Cryptanalysis of the shifted conjugacy authentication protocol
Freier ZugriffDOAJ | 2008|Schlagwörter: braid group cryptography -
DAGS: Key encapsulation using dyadic GS codes
Freier ZugriffDOAJ | 2018|Schlagwörter: post-quantum cryptography, code-based cryptography -
Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)
Freier ZugriffDOAJ | 2020|Schlagwörter: cryptography -
Designing Efficient Dyadic Operations for Cryptographic Applications
Freier ZugriffDOAJ | 2020|Schlagwörter: post-quantum cryptography, code-based cryptography -
Determined Key Distribution Protocol Using Non-Orthogonal Quantum States
NationallizenzTrans Tech Publications | 2012|Schlagwörter: Quantum Cryptography -
Distortion maps for supersingular genus two curves
Freier ZugriffDOAJ | 2009|Schlagwörter: hyperelliptic curve cryptography -
Distribution of some sequences of points on elliptic curves
Freier ZugriffDOAJ | 2007|Schlagwörter: public key cryptography, -
Dynamic Cryptography through Plasmon‐Enhanced Fluorescence Blinking
Wiley | 2022|Schlagwörter: dynamic cryptography -
Equidistribution Among Cosets of Elliptic Curve Points in Intervals
Freier ZugriffDOAJ | 2020|Schlagwörter: elliptic curve cryptography -
Equivalent keys in ℳultivariate uadratic public key systems
Freier ZugriffDOAJ | 2011|Schlagwörter: post-quantum cryptography -
Estimation of the hardness of the learning with errors problem with a restricted number of samples
Freier ZugriffDOAJ | 2019|Schlagwörter: lattice-based cryptography, post-quantum cryptography -
Experimental Implementation of Metasurfaces for Secure Multi‐Channel Image Encryption in the Infrared
Wiley | 2023|Schlagwörter: cryptography -
Factor-4 and 6 compression of cyclotomic subgroups of and
Freier ZugriffDOAJ | 2010|Schlagwörter: pairing-based cryptography -
Families of elliptic curves with rational 3-torsion
Freier ZugriffDOAJ | 2012|Schlagwörter: cryptography -
Families of genus 2 curves with small embedding degree
Freier ZugriffDOAJ | 2009|Schlagwörter: pairing-based cryptography -
Fast genus 2 arithmetic based on Theta functions
Freier ZugriffDOAJ | 2007|Schlagwörter: hyperelliptic curve cryptography, -
Flexible Plasmonic Metasurfaces with User‐Designed Patterns for Molecular Sensing and Cryptography
Wiley | 2016|Schlagwörter: cryptography -
Generating pairing-friendly elliptic curve parameters using sparse families
Freier ZugriffDOAJ | 2018|Schlagwörter: pairing-based cryptography -
Hash functions from superspecial genus-2 curves using Richelot isogenies
Freier ZugriffDOAJ | 2020|Schlagwörter: cryptography -
Heuristics on pairing-friendly elliptic curves
Freier ZugriffDOAJ | 2012|Schlagwörter: pairing-based cryptography
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.