Unveiling a novel S-Box strategy: The dynamic 3D scrambling approach. [PDF]
Ahmad Khan N +7 more
europepmc +1 more source
Bit-Level Construction for Multiplicative-Repetition-Based Non-Binary Polar Codes. [PDF]
Xu R, Chen P, Liu L, Zhu M, Bai B.
europepmc +1 more source
A secure and efficient image encryption scheme based on chaotic systems and nonlinear transformations. [PDF]
Alexan W, Shabasy NHE, Ehab N, Maher EA.
europepmc +1 more source
Parametric action of homomorphic image of modular group and it's application in image encryption. [PDF]
Rafiq A +7 more
europepmc +1 more source
Mixed-mode in-memory computing: towards high-performance logic processing in a memristive crossbar array. [PDF]
Du N +11 more
europepmc +1 more source
A network coding transmission strategy for preventing eavesdropping attacks. [PDF]
Pu B, Huang H, Pang G.
europepmc +1 more source
On Quantum Ergodicity for Higher Dimensional Cat Maps. [PDF]
Kurlberg P +3 more
europepmc +1 more source
Compressive sensing techniques based on secure data aggregation in WSNs. [PDF]
Madkour ME +5 more
europepmc +1 more source
Related searches:
Galois extensions and $$O^{*}$$-fields
Positivity, 2023zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kenneth Evans, Jingjing Ma
openaire +1 more source
A small portion of linear algebra and combinatorics are used in the development of Hamming codes, the first generation error control codes. The design of error control codes such as BCH codes and Reed Solomon codes relies on the structures of Galois fields and polynomials over Galois fields.
openaire +1 more source

