Year of publication
Subject
Type of material
Licence
Language
Synonyms were used for: Geheimschrift
Search without synonyms: keywords:(Geheimschrift)
Used synonyms:
- cryptography
-
Device-independent quantum key distribution from computational assumptions
Free accessIOP Institute of Physics | 2021|Keywords: quantum cryptography, post-quantum cryptography -
Type-2 QC LDPC codes and upper bounds on the minimum distance
American Institute of Physics | 2024|Keywords: CRYPTOGRAPHY -
An improved DNA cryptosystem based graph labeling techniques
American Institute of Physics | 2022|Keywords: CRYPTOGRAPHY -
Secured information sharing using Laplace transform and hyperbolic tangent function
American Institute of Physics | 2022|Keywords: CRYPTOGRAPHY -
A symmetric key cryptosystem based on singular linear transformation
American Institute of Physics | 2023|Keywords: CRYPTOGRAPHY -
A hybrid combination of symmetric and asymmetric encryption technique with graph labeling
American Institute of Physics | 2022|Keywords: CRYPTOGRAPHY -
An adaptive attack on 2-SIDH
Taylor & Francis Verlag | 2020|Keywords: Cryptography, Isogeny-based cryptography -
Simple Matrix – A Multivariate Public Key Cryptosystem (MPKC) for Encryption
Elsevier | 2015|Keywords: Multivariate cryptography, Public key cryptography -
Adaptive algorithms of error correction and error estimation in quantum cryptography
Free accessAmerican Institute of Physics | 2021|Keywords: QUANTUM CRYPTOGRAPHY -
Quantum measurement with post-selection for two mixed states
Free accessAmerican Institute of Physics | 2021|Keywords: QUANTUM CRYPTOGRAPHY -
Measuring entangled state: On connection between observable uncertainty and ensemble coherence
Free accessAmerican Institute of Physics | 2021|Keywords: QUANTUM CRYPTOGRAPHY -
Multi-party Quantum Key Agreement Protocol for Detection of Collusive Attacks in each Sub-Circle Segment by Headers
Online Contents | 2022|Keywords: Quantum cryptography, Classical cryptography -
Device-independent oblivious transfer from the bounded-quantum-storage-model and computational assumptions
Free accessIOP Institute of Physics | 2023|Keywords: quantum cryptography, post-quantum cryptography -
Quantum asymmetric cryptography with symmetric keys
Online Contents | 2009|Keywords: public-key cryptography, quantum cryptography -
Composable security in relativistic quantum cryptography
Free accessDOAJ | 2019|Keywords: quantum cryptography, relativistic quantum cryptography, abstract cryptography -
Post-Quantum-Kryptografie
Free accessFraunhofer Publica | 2016|Keywords: cryptography, post-quantum cryptography -
A simple yet efficient S-box method based on chaotic sine map
Elsevier | 2016|Keywords: Cryptography -
Device-independent quantum key distribution from computational assumptions
Free accessDOAJ | 2021|Keywords: quantum cryptography, post-quantum cryptography -
A Framework for Quantum-Classical Cryptographic Translation
Online Contents | 2021|Keywords: Quantum cryptography, Classical cryptography -
Double image encryption scheme by using random phase encoding and pixel exchanging in the gyrator transform domains
Elsevier | 2012|Keywords: Cryptography
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.