Erscheinungsjahr
Fach
Format
Lizenz
TIB-Lesesaalbestand
LUH-Institutsbestand
Synonyme wurden verwendet für: Geheimschrift
Suche ohne Synonyme: keywords:(Geheimschrift)
Verwendete Synonyme:
- cryptography
-
Using Inclusion / Exclusion to find Bent and Balanced Monomial Rotation Symmetric Functions
Freier ZugriffDOAJ | 2021|Schlagwörter: cryptography -
Using four-prime RSA in which some of the bits are specified
IET Digital Library Archive | 1994|Schlagwörter: public key cryptography -
Using Bernstein–Vazirani algorithm to attack block ciphers
Freier ZugriffOnline Contents | 2018|Schlagwörter: Post-quantum cryptography -
Using Bernstein–Vazirani algorithm to attack block ciphers
Online Contents | 2018|Schlagwörter: Post-quantum cryptography -
Using Bernstein–Vazirani algorithm to attack block ciphers
Freier ZugriffSpringer Verlag | 2018|Schlagwörter: Post-quantum cryptography -
Using a reservoir computer to learn chaotic attractors, with applications to chaos synchronization and cryptography
Freier ZugriffBASE | 2018|Schlagwörter: chaos based cryptography -
Using Abelian Varieties to Improve Pairing-Based Cryptography
Online Contents | 2008|Schlagwörter: Pairing-based cryptography, Elliptic curve cryptography -
Using Abelian Varieties to Improve Pairing-Based Cryptography
Online Contents | 2008|Schlagwörter: Pairing-based cryptography, Elliptic curve cryptography -
Using Abelian Varieties to Improve Pairing-Based Cryptography
Springer Verlag | 2008|Schlagwörter: Pairing-based cryptography, Elliptic curve cryptography -
Uses and Abuses of Cryptography
British Library Conference Proceedings | 2003|Schlagwörter: cryptography -
Use of trapdoor structures in cryptography
NationallizenzTaylor & Francis Verlag | 1986|Schlagwörter: cryptography -
Use of Cryptography for Monetary Issuance and Securing Financial Transactions
Springer Verlag | 2021|Schlagwörter: Cryptography -
Use of Chaotic Dynamical Systems to Generate Pseudorandom Bitstreams
NTIS | 1993|Schlagwörter: Cryptography -
Usable Optimistic Fair Exchange
British Library Conference Proceedings | 2010|Schlagwörter: Cryptography -
Usability of access control
Freier ZugriffORKG Comparisons | 2023Schlagwörter: Cryptography and Security -
Usability and Security of Gaze-Based Graphical Grid Passwords
British Library Conference Proceedings | 2013|Schlagwörter: Financial cryptography -
UpWB: An Uncoupled Architecture Design for White-box Cryptography Using Vectorized Montgomery Multiplication
Freier ZugriffDOAJ | 2024|Schlagwörter: white-box cryptography -
Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity
Online Contents | 2016|Schlagwörter: Lightweight cryptography -
Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity
Online Contents | 2016|Schlagwörter: Lightweight cryptography -
Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity
Springer Verlag | 2016|Schlagwörter: Lightweight cryptography -
Untraceable Fair Network Payment Protocols with Off-Line TTP
Freier ZugriffSpringer Verlag | 2003|Schlagwörter: Cryptography -
Unrolled Cryptography on Silicon
Freier ZugriffDOAJ | 2020|Schlagwörter: Unrolled Cryptography, Low-Latency Cryptography -
Unprovable Security of Perfect NIZK and Non-interactive Non-malleable Commitments
Online Contents | 2016|Schlagwörter: Cryptography -
Unprovable Security of Perfect NIZK and Non-interactive Non-malleable Commitments
Online Contents | 2016|Schlagwörter: Cryptography -
Unprovable Security of Perfect NIZK and Non-interactive Non-malleable Commitments
Springer Verlag | 2016|Schlagwörter: Cryptography -
Unmasking secrecy [security schemes]
IET Digital Library Archive | 2003|Schlagwörter: elliptic curve cryptography, cryptography -
Unlocking Ideas: Using Escape Room Puzzles in a Cryptography Classroom
Taylor & Francis Verlag | 2018|Schlagwörter: Cryptography -
Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic
Online Contents | 2020|Schlagwörter: Cryptography -
Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic
Springer Verlag | 2020|Schlagwörter: Cryptography -
Universal Service-Providers for Private Information Retrieval
NationallizenzSpringer Verlag | 2001|Schlagwörter: Private information retrieval, Secure computation, Commodity-based cryptography, Communication complexity. -
Universal Hash-Function Families: From Hashing to Authentication
British Library Conference Proceedings | 2014|Schlagwörter: Cryptography -
Universal forgery on Sekhar's signature scheme with message recovery
Taylor & Francis Verlag | 2004|Schlagwörter: Cryptography -
Uniqueness of low genus optimal curves over F~2
British Library Conference Proceedings | 2010|Schlagwörter: Cryptography -
Unifying Leakage Models: From Probing Attacks to Noisy Leakage
Online Contents | 2018|Schlagwörter: Leakage-resilient cryptography -
Unifying Leakage Models: From Probing Attacks to Noisy Leakage
Freier ZugriffOnline Contents | 2018|Schlagwörter: Leakage-resilient cryptography -
Unifying Leakage Models: From Probing Attacks to Noisy Leakage
Freier ZugriffSpringer Verlag | 2018|Schlagwörter: Leakage-resilient cryptography -
Uniform encodings to elliptic curves and indistinguishable point representation
Online Contents | 2020|Schlagwörter: Elliptic curve cryptography -
Uniform encodings to elliptic curves and indistinguishable point representation
Springer Verlag | 2020|Schlagwörter: Elliptic curve cryptography -
Undeviating Adaptive Sheltered Cryptography (UASC) method based low power and high secure cache memory design
Elsevier | 2019|Schlagwörter: Undeviating Adaptive Sheltered Cryptography -
Undetachable Threshold Signatures
British Library Conference Proceedings | 2001|Schlagwörter: cryptography -
Understanding the Weaknesses of Human-Protocol Interaction
British Library Conference Proceedings | 2012|Schlagwörter: Financial cryptography -
Understanding Adaptivity: Random Systems Revisited
British Library Conference Proceedings | 2012|Schlagwörter: Cryptography
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.