Results 61 to 70 of about 8,966,306 (229)
Sur les représentations induites des groupes de Lie [PDF]
François Bruhat
openalex +1 more source
A Combination of SHA-256 and DES for Visual Data Protection
This study employs SHA-256 and DES algorithms to safeguard visual data through encryption and decryption processes. Research findings demonstrate that this method provides robust security with image histograms that are difficult to recognize and randomly
Aristides Bima Wintaka +3 more
doaj +1 more source
Sur une extension d'un principe classique de l'analyse et sur quelques propriétés des fonctions monogènes dans le voisinage d'un point singulier [PDF]
E. Pharagmén, Ernst Lindelöf
openalex +1 more source
The increasing complexity of university admissions requires efficient, standardized processes to manage large volumes of applications and changing regulatory requirements. To address this, the paper applies the TM Forum’s Business Process Framework (eTOM)
Konstantin M. Terentyev +3 more
doaj +1 more source
Linear Cryptanalysis Method for DES Cipher
M. Matsui
semanticscholar +1 more source
Differential cryptanalysis of DES-like cryptosystems
E. Biham, A. Shamir
semanticscholar +1 more source
Sur l'application de la première moyenne arithmétique dans la théorie des séries de fonctions orthogonales [PDF]
Antoni Zygmund
openalex +1 more source

