Results 231 to 240 of about 367,345 (251)
Some of the next articles are maybe not open access.

Controlled Operations as a Cryptographic Primitive

Mathematical Methods, Models, and Architectures for Network Security Systems, 2001
B. Izotov, A. Moldovyan, N. Moldovyan
semanticscholar   +1 more source

Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive

Fast Software Encryption Workshop, 2003
N. Ferguson   +5 more
semanticscholar   +1 more source

Cryptographic Primitives in Blockchain Technology

2020
Abstract Many online applications, especially in the financial industries, are running on blockchain technologies in a decentralized manner, without the use of an authoritative entity or a trusted third party. Such systems are only secured by cryptographic protocols and a consensus mechanism.
openaire   +1 more source

On the Bit Security of Cryptographic Primitives

IACR Cryptology ePrint Archive, 2018
Daniele Micciancio, Michael Walter
semanticscholar   +1 more source

Implementation of Cryptographic Primitives

International Journal of Engineering Trends and Technology, 2017
Shreya Rajkumar, Chester Rebeiro
openaire   +1 more source

Image Steganography using Cryptographic Primitives

2021 International Conference on Cyber Warfare and Security (ICCWS), 2021
Zeeshan Abbas, Muhammad Qasim Saeed
openaire   +1 more source

Physically Unclonable Cryptographic Primitives by Chemical Vapor Deposition of Layered MoS2.

ACS Nano, 2017
Abdullah Alharbi   +3 more
semanticscholar   +1 more source

From Biometric Data to Cryptographic Primitives: A New Method for Generation of Substitution Boxes

International Conference on Biomedical Engineering and Biotechnology, 2017
F. Özkaynak
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy