Results 221 to 230 of about 63,614 (274)
A Decentralized Signcryption Scheme Based on CFL. [PDF]
Shi L, Liu M.
europepmc +1 more source
Raw QPP-RNG randomness via system jitter across platforms: a NIST SP 800-90B evaluation. [PDF]
Vrana G, Lou D, Kuang R.
europepmc +1 more source
Secure software development: leveraging application call graphs to detect security vulnerabilities. [PDF]
Yan L, Zhao G, Li X, Sun P.
europepmc +1 more source
Cryptanalysis of efficient controlled semi-quantum secret sharing protocol with entangled state. [PDF]
Li S, Cai XQ, Song SJ, Wei CY, Wang TY.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings of the fourteenth annual ACM symposium on Theory of computing - STOC '82, 1982
A cryptographic transformation is a mapping f from a set of cleartext messages, M, to a set of ciphertext messages. Since for m e M, f(m) should hide the contents of m from an enemy, f-1 should, in a certain technical sense, be difficult to infer from f(m) and public knowledge about f.
Richard A. DeMillo+2 more
openaire +2 more sources
A cryptographic transformation is a mapping f from a set of cleartext messages, M, to a set of ciphertext messages. Since for m e M, f(m) should hide the contents of m from an enemy, f-1 should, in a certain technical sense, be difficult to infer from f(m) and public knowledge about f.
Richard A. DeMillo+2 more
openaire +2 more sources
Visualization of cryptographic protocols with GRACE
Journal of Visual Languages & Computing, 2008In this paper we present GRACE (graphical representation and animation for cryptography education), a Java-based educational tool that can be used to help in teaching and understanding of cryptographic protocols. The tool adopts an active learning model that engages the learner by asking him to describe, in an exemplification of a real-world scenario ...
CATTANEO, Giuseppe+2 more
openaire +3 more sources