Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Periodical

Quantum-Proof Secrets.

Subjects: QUANTUM computers; CRYPTOGRAPHY; QUANTUM cryptographyNATIONAL Institute of Standards & Technology (U.S.)

  • Source: Scientific American; Feb2024, Vol. 330 Issue 2, p36-43, 8p, 2 Color Photographs, 3 Diagrams

Record details

×
Periodical

History, decoded.

Subjects: MONOGRAMS; COMPUTER vision; CRYPTOGRAPHY

  • Source: New Scientist; 9/23/2023, Vol. 259 Issue 3457, p40-43, 4p, 2 Color Photographs, 1 Cartoon or Caricature

Record details

×
Conference

A blockchain-based secure system for cloud storage.

Subjects: CLOUD storage; BLOCKCHAINS; CLOUD computing

  • Source: AIP Conference Proceedings; 2024, Vol. 3919 Issue 1, p1-7, 7p

Record details

×
Periodical

Toward Basing Cryptography on the Hardness of EXP.

Subjects: CRYPTOGRAPHY; COMPUTATIONAL complexity

  • Source: Communications of the ACM; May2023, Vol. 66 Issue 5, p91-99, 9p

Record details

×
Academic Journal

A novel secure cryptography model for data transmission based on Rotor64 technique.

  • Source: Multimedia Tools & Applications; Apr2024, Vol. 83 Issue 13, p37295-37314, 20p

Record details

×
Academic Journal

A multilevel qubit encryption mechanism using SHA-512.

  • Source: Multimedia Tools & Applications; Apr2024, Vol. 83 Issue 12, p34995-35024, 30p

Record details

×
Academic Journal

Securing edge computing using cryptographic schemes: a review.

  • Source: Multimedia Tools & Applications; Apr2024, Vol. 83 Issue 12, p34825-34848, 24p

Record details

×
Academic Journal

PMNS for cryptography: A guided tour.

Subjects: NUMBER systems; ARITHMETIC; MODULAR arithmetic

  • Source: Advances in Mathematics of Communications; Apr2024, Vol. 18 Issue 2, p1-18, 18p

Record details

×
Academic Journal

A class of weightwise almost perfectly balanced Boolean functions.

Subjects: BOOLEAN functions; STREAM ciphers; HAMMING weight

  • Source: Advances in Mathematics of Communications; Apr2024, Vol. 18 Issue 2, p1-25, 25p

Record details

×
Academic Journal

DieRoll: A Unique Key Generation and Encryption Technique.

  • Source: Journal of Applied Security Research; Apr-Jun2024, Vol. 19 Issue 2, p168-195, 28p

Record details

×
Academic Journal

A technique for securing digital audio files based on rotation and XOR operations.

Subjects: DIGITAL audio; SIGNAL-to-noise ratio; AUDIO communication

  • Source: Soft Computing - A Fusion of Foundations, Methodologies & Applications; Mar2024, Vol. 28 Issue 6, p5523-5540, 18p

Record details

×
Academic Journal

A hybrid crypto-compression model for secure brain mri image transmission.

  • Source: Multimedia Tools & Applications; Mar2024, Vol. 83 Issue 8, p24361-24381, 21p

Record details

×
Academic Journal

Paillier cryptosystem enhancement for Homomorphic Encryption technique.

  • Source: Multimedia Tools & Applications; Mar2024, Vol. 83 Issue 8, p22567-22579, 13p

Record details

×
Academic Journal

A Deep Dive into Deep Learning-Powered Steganography for Enhanced Security: Review.

Subjects: CRYPTOGRAPHY; DEEP learning; DIGITAL media

  • Source: International Research Journal of Innovations in Engineering & Technology; Mar2024, Vol. 8 Issue 3, p79-89, 11p

Record details

×
Academic Journal

A short basis of the Stickelberger ideal of a cyclotomic field.

Subjects: FINITE fields; CYCLOTOMIC fields; GROUP rings

  • Source: Mathematics of Computation; Mar2024, Vol. 93 Issue 346, p887-909, 23p

Record details

×
Academic Journal

Toward Next Generation Quantum-Safe eIDs and eMRTDs: A Survey.

Subjects: ELECTRONIC records; CYBERTERRORISM; RESEARCH questions

  • Source: ACM Transactions on Embedded Computing Systems; Mar2024, Vol. 23 Issue 2, p1-28, 28p

Record details

×
  • 1-50 of  14,475 results for ""CRYPTOGRAPHY""