Results 231 to 240 of about 367,345 (251)
Some of the next articles are maybe not open access.
Controlled Operations as a Cryptographic Primitive
Mathematical Methods, Models, and Architectures for Network Security Systems, 2001B. Izotov, A. Moldovyan, N. Moldovyan
semanticscholar +1 more source
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive
Fast Software Encryption Workshop, 2003N. Ferguson +5 more
semanticscholar +1 more source
Cryptographic Primitives in Blockchain Technology
2020Abstract Many online applications, especially in the financial industries, are running on blockchain technologies in a decentralized manner, without the use of an authoritative entity or a trusted third party. Such systems are only secured by cryptographic protocols and a consensus mechanism.
openaire +1 more source
SIMPL Systems as a Keyless Cryptographic and Security Primitive
Cryptography and Security, 2012U. Rührmair
semanticscholar +1 more source
On the Bit Security of Cryptographic Primitives
IACR Cryptology ePrint Archive, 2018Daniele Micciancio, Michael Walter
semanticscholar +1 more source
Implementation of Cryptographic Primitives
International Journal of Engineering Trends and Technology, 2017Shreya Rajkumar, Chester Rebeiro
openaire +1 more source
Image Steganography using Cryptographic Primitives
2021 International Conference on Cyber Warfare and Security (ICCWS), 2021Zeeshan Abbas, Muhammad Qasim Saeed
openaire +1 more source
Physically Unclonable Cryptographic Primitives by Chemical Vapor Deposition of Layered MoS2.
ACS Nano, 2017Abdullah Alharbi +3 more
semanticscholar +1 more source
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions
Journal of Cryptology, 2017Sam Kim, David J. Wu
semanticscholar +1 more source
From Biometric Data to Cryptographic Primitives: A New Method for Generation of Substitution Boxes
International Conference on Biomedical Engineering and Biotechnology, 2017F. Özkaynak
semanticscholar +1 more source

