Erscheinungsjahr
Fach
Format
Lizenz
TIB-Lesesaalbestand
LUH-Institutsbestand
Synonyme wurden verwendet für: Geheimschrift
Suche ohne Synonyme: keywords:(Geheimschrift)
Verwendete Synonyme:
- cryptography
-
Initial-value problem of the Boolean function's primary function and its application in cryptographic system
Emerald Group Publishing | 2010|Schlagwörter: Cryptography -
Designing Efficient Dyadic Operations for Cryptographic Applications
Freier ZugriffDOAJ | 2020|Schlagwörter: post-quantum cryptography, code-based cryptography -
Inverting the Burau and Lawrence-Krammer Representations
British Library Conference Proceedings | 2006|Schlagwörter: Cryptography., Cryptography -
Towards Provable Security for Cryptographic Constructions Arising from Combinatorial Group Theory
British Library Conference Proceedings | 2006|Schlagwörter: Cryptography., Cryptography -
Length-based conjugacy search in the braid group
British Library Conference Proceedings | 2006|Schlagwörter: Cryptography., Cryptography -
Using shifted conjugacy in braid-based cryptography
British Library Conference Proceedings | 2006|Schlagwörter: Cryptography., Cryptography -
Efficient and secure two-factor dynamic ID-based password authentication scheme with provable security
Taylor & Francis Verlag | 2018|Schlagwörter: elliptic curve cryptography -
MPF problem over modified medial semigroup Is NP-complete
Freier ZugriffBASE | 2018|Schlagwörter: cryptography, non-commutative cryptography -
A new key exchange protocol based on the decomposition problem
British Library Conference Proceedings | 2006|Schlagwörter: Cryptography., Cryptography -
Algebraic Problems in Symmetric Cryptography: Two Recent Results on Highly Nonlinear Functions
British Library Conference Proceedings | 2006|Schlagwörter: Cryptography., Cryptography -
Designing Key Transport Protocols Using Combinatorial Group Theory
British Library Conference Proceedings | 2006|Schlagwörter: Cryptography., Cryptography -
Key agreement, the Algebraic Eraser™, and lightweight cryptography
British Library Conference Proceedings | 2006|Schlagwörter: Cryptography., Cryptography -
Methods for encryption in early 19th-century Ottoman diplomatic correspondence
Taylor & Francis Verlag | 2022|Schlagwörter: cryptography -
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
Online Contents | 2018|Schlagwörter: Homomorphic cryptography -
How Can Quantum Computing Break Today's Cryptography?
Wiley | 2019|Schlagwörter: cryptography basics, break cryptography -
Using the subgroup membership search problem in public key cryptography
British Library Conference Proceedings | 2006|Schlagwörter: Cryptography., Cryptography -
Geometric Key Establishment
British Library Conference Proceedings | 2006|Schlagwörter: Cryptography., Cryptography -
Extended security arguments for signature schemes
Online Contents | 2014|Schlagwörter: Code-based cryptography, Multivariate cryptography -
Extended security arguments for signature schemes
Online Contents | 2014|Schlagwörter: Code-based cryptography, Multivariate cryptography -
MPF problem over modified medial semigroup Is NP-complete
Freier ZugriffBASE | 2018|Schlagwörter: cryptography, non-commutative cryptography -
A new efficient permutation-diffusion encryption algorithm based on a chaotic map
Elsevier | 2021|Schlagwörter: Cryptography -
Unlocking Ideas: Using Escape Room Puzzles in a Cryptography Classroom
Taylor & Francis Verlag | 2018|Schlagwörter: Cryptography -
A Hybrid Combinatorial-Boolean Approach Toward Perfect Secrecy in IoT
Springer Verlag | 2022|Schlagwörter: Combinatorial cryptography, Boolean cryptography, Secret algorithm cryptography, Perfectly secure cryptography, Information-theoretic cryptography -
Constructions in public-key cryptography over matrix groups
British Library Conference Proceedings | 2006|Schlagwörter: Cryptography., Cryptography -
MPF problem over modified medial semigroup Is NP-complete
Freier ZugriffBASE | 2018|Schlagwörter: cryptography, non-commutative cryptography -
Mathematical foundations of public key cryptography
TIBKAT | 2016|Schlagwörter: Cryptography, Cryptography -- Mathematics -
Towards Isogeny-Based Password-Authenticated Key Establishment
Freier ZugriffDeGruyter | 2020|Schlagwörter: post-quantum cryptography, isogeny-based cryptography -
Anonymity in shared symmetric key primitives
Online Contents | 2010|Schlagwörter: Secret-key cryptography, Threshold cryptography -
Anonymity in shared symmetric key primitives
Online Contents | 2010|Schlagwörter: Secret-key cryptography, Threshold cryptography -
Structural Attacks for Public Key Cryptosystems based on Gabidulin Codes
Online Contents | 2007|Schlagwörter: Public key cryptography, Code based cryptography -
Novel Sequences of Prime Palindromes in Various Bases
Freier ZugriffBASE | 2021|Schlagwörter: cryptography -
Introduction to cryptography : with mathematical foundations and computer implementations
TIBKAT | 2011|Schlagwörter: Cryptography -
Security problems for a pseudorandom sequence generator based on the Chen chaotic system
Elsevier | 2013|Schlagwörter: Cryptography -
On the design and security of Lee metric McEliece cryptosystems
Online Contents | 2022|Schlagwörter: Post-quantum cryptography, Code-based cryptography -
Feedback synchronization of the fractional order reverse butterfly-shaped chaotic system and its application to digital cryptography
Online Contents | 2013|Schlagwörter: Cryptography -
An efficient statistical zero-knowledge authentication protocol for smart cards
Taylor & Francis Verlag | 2016|Schlagwörter: post-quantum cryptography, lattice-based cryptography -
Security analysis and improvement of the pseudo-random number generator based on quantum chaotic map
Online Contents | 2018|Schlagwörter: Cryptography -
The e-derivative of Boolean functions and its application in the fault detection and cryptographic system
Emerald Group Publishing | 2011|Schlagwörter: Cryptography -
Machine learning-enhanced hybrid cryptography and image steganography algorithm for securing cloud data
IOS Press | 2024|Schlagwörter: hybrid cryptography -
A code-based hybrid signcryption scheme
Freier ZugriffDeGruyter | 2023|Schlagwörter: public-key cryptography, code-based cryptography -
FPGA implementation of dynamically reconfigurable IoT security module using algorithm hopping
Elsevier | 2019|Schlagwörter: Cryptography -
Security analysis and improvement of the pseudo-random number generator based on quantum chaotic map
Online Contents | 2018|Schlagwörter: Cryptography -
Reliable advanced encryption standard hardware implementation: 32- bit and 64-bit data-paths
Elsevier | 2020|Schlagwörter: Cryptography -
Reproducible families of codes and cryptographic applications
Freier ZugriffDeGruyter | 2021|Schlagwörter: code-based cryptography, post-quantum cryptography
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.