Results 231 to 240 of about 388,006 (269)
Some of the next articles are maybe not open access.
Controlled Operations as a Cryptographic Primitive
Mathematical Methods, Models, and Architectures for Network Security Systems, 2001B. Izotov, A. Moldovyan, N. Moldovyan
semanticscholar +1 more source
Integrative oncology: Addressing the global challenges of cancer prevention and treatment
Ca-A Cancer Journal for Clinicians, 2022Jun J Mao,, Msce +2 more
exaly
Cryptographic Primitives in Blockchain Technology
2020Abstract Many online applications, especially in the financial industries, are running on blockchain technologies in a decentralized manner, without the use of an authoritative entity or a trusted third party. Such systems are only secured by cryptographic protocols and a consensus mechanism.
openaire +1 more source
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive
Fast Software Encryption Workshop, 2003N. Ferguson +5 more
semanticscholar +1 more source
SIMPL Systems as a Keyless Cryptographic and Security Primitive
Cryptography and Security, 2012U. Rührmair
semanticscholar +1 more source
On the Bit Security of Cryptographic Primitives
IACR Cryptology ePrint Archive, 2018Daniele Micciancio, Michael Walter
semanticscholar +1 more source
Implementation of Cryptographic Primitives
International Journal of Engineering Trends and Technology, 2017Shreya Rajkumar, Chester Rebeiro
openaire +1 more source
Image Steganography using Cryptographic Primitives
2021 International Conference on Cyber Warfare and Security (ICCWS), 2021Zeeshan Abbas, Muhammad Qasim Saeed
openaire +1 more source
Physically Unclonable Cryptographic Primitives by Chemical Vapor Deposition of Layered MoS2.
ACS Nano, 2017Abdullah Alharbi +3 more
semanticscholar +1 more source

