Erscheinungsjahr
Fach
Format
Lizenz
Sprache
Synonyme wurden verwendet für: Geheimschrift
Suche ohne Synonyme: keywords:(Geheimschrift)
Verwendete Synonyme:
- cryptography
-
A cryptographic system based on finite field transforms
Springer Verlag | 1980|Schlagwörter: cryptography -
Multisecret-sharing scheme based on one-way function
IET Digital Library Archive | 1995|Schlagwörter: cryptography -
Authenticated encryption schemes with message linkages for message flows
Elsevier | 2001|Schlagwörter: Cryptography -
Improvements of authenticated encryption schemes with message linkages for message flows
Elsevier | 2004|Schlagwörter: Cryptography -
64-bit Block ciphers: hardware implementations and comparison analysis
Elsevier | 2004|Schlagwörter: Cryptography -
Password authenticated key exchange protocols among diverse network domains
Elsevier | 2005|Schlagwörter: Cryptography -
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings
Elsevier | 2006|Schlagwörter: Cryptography -
How to protect exchanged secrets in the fair exchange protocol with off-line TTP
Elsevier | 2006|Schlagwörter: Cryptography -
ID-based threshold decryption secure against adaptive chosen-ciphertext attack
Elsevier | 2006|Schlagwörter: Identity-based cryptography -
Compact modular exponentiation accelerator for modern FPGA devices
Elsevier | 2007|Schlagwörter: Cryptography -
A new method for using hash functions to solve remote user authentication
Elsevier | 2007|Schlagwörter: Cryptography -
On the design and implementation of a RISC processor extension for the KASUMI encryption algorithm
Elsevier | 2007|Schlagwörter: Cryptography -
Hardware architectures for the Tate pairing over GF(2m)
Elsevier | 2007|Schlagwörter: Cryptography -
Applying systolic multiplication–inversion architectures based on modified extended Euclidean algorithm for GF(2k) in elliptic curve cryptography
Elsevier | 2007|Schlagwörter: Elliptic curve cryptography -
A versatile Montgomery multiplier architecture with characteristic three support
Elsevier | 2008|Schlagwörter: Public key cryptography, Identity-based cryptography -
Provably secure proxy-protected signature schemes based on RSA
Elsevier | 2008|Schlagwörter: Cryptography -
An EDA tool for implementation of low power and secure crypto-chips
Elsevier | 2008|Schlagwörter: Cryptography -
Dynamic and efficient joint encryption scheme in the plain public key model
Elsevier | 2008|Schlagwörter: Group-oriented cryptography -
An efficient cryptosystem Delta for stream cipher applications
Elsevier | 2008|Schlagwörter: Cryptography -
Identity-based strong designated verifier signature schemes: Attacks and new construction
Elsevier | 2008|Schlagwörter: Identity base cryptography -
Identity-based mix: Anonymous communications without public key certificates
Elsevier | 2009|Schlagwörter: Identity-based cryptography -
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings
Elsevier | 2009|Schlagwörter: Cryptography -
Full custom low-power/high performance DDP-based Cobra-H64 cipher
Elsevier | 2009|Schlagwörter: Cryptography -
An improved semantically-secure identity-based signcryption scheme in the standard model
Elsevier | 2009|Schlagwörter: Identity-based cryptography -
FPGA and ASIC implementations of the pairing in characteristic three
Elsevier | 2009|Schlagwörter: Elliptic curve cryptography -
Forgery attacks on Kang et al.’s identity-based strong designated verifier signature scheme and its improvement with security proof
Elsevier | 2010|Schlagwörter: Cryptography -
Ultrabright and efficient single-photon generation based on nitrogen-vacancy centres in nanodiamonds on a solid immersion lens
Tema Archiv | 2011|Schlagwörter: quantum cryptography -
Superconducting nanowire single-photon detectors: physics and applications
Tema Archiv | 2012|Schlagwörter: quantum cryptography -
An Entropy Measure of Non-Stationary Processes
Freier ZugriffDOAJ | 2014|Schlagwörter: cryptography -
Trichocyanines: a Red‐Hair‐Inspired Modular Platform for Dye‐Based One‐Time‐Pad Molecular Cryptography
Freier ZugriffWiley | 2015|Schlagwörter: cryptography -
Versatile digit serial multipliers for binary extension fields
Elsevier | 2015|Schlagwörter: Elliptic curve cryptography -
Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations
Freier ZugriffDOAJ | 2015|Schlagwörter: quantum cryptography -
Quantum Data Locking for Secure Communication against an Eavesdropper with Time-Limited Storage
Freier ZugriffDOAJ | 2015|Schlagwörter: quantum cryptography -
Passive Decoy-State Quantum Key Distribution with Coherent Light
Freier ZugriffDOAJ | 2015|Schlagwörter: quantum cryptography -
Applied Cryptography Using Chaos Function for Fast Digital Logic-Based Systems in Ubiquitous Computing
Freier ZugriffDOAJ | 2015|Schlagwörter: cryptography -
Comparing Security Notions of Secret Sharing Schemes
Freier ZugriffDOAJ | 2015|Schlagwörter: cryptography -
Finite Key Size Analysis of Two-Way Quantum Cryptography
Freier ZugriffDOAJ | 2015|Schlagwörter: quantum cryptography -
Three-Stage Quantum Cryptography Protocol under Collective-Rotation Noise
Freier ZugriffDOAJ | 2015|Schlagwörter: quantum cryptography -
A lightweight message authentication scheme for Smart Grid communications in power sector
Elsevier | 2016|Schlagwörter: Lightweight cryptography -
Molecular neuron: From sensing to logic computation, information encoding, and encryption
Elsevier | 2016|Schlagwörter: Molecular cryptography -
Cloud security: Emerging threats and current solutions
Elsevier | 2016|Schlagwörter: Homomorphic cryptography -
Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks
Online Contents | 2016|Schlagwörter: Cryptography -
Deterministic generation of large scale atomic W states
Freier ZugriffBASE | 2016|Schlagwörter: Cryptography -
Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing
Freier ZugriffDOAJ | 2016|Schlagwörter: applied cryptography -
Enhanced Energy Distribution for Quantum Information Heat Engines
Freier ZugriffDOAJ | 2016|Schlagwörter: quantum cryptography -
A low-power SHA-3 designs using embedded digital signal processing slice on FPGA
Elsevier | 2016|Schlagwörter: Cryptography -
Trusted Noise in Continuous-Variable Quantum Key Distribution: A Threat and a Defense
Freier ZugriffDOAJ | 2016|Schlagwörter: quantum cryptography
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.