Results 161 to 170 of about 8,486 (220)
On the linear programming bound for linear Lee codes. [PDF]
Astola H, Tabus I.
europepmc +1 more source
Remote Sensing Techniques for Water Quality Monitoring: A Review. [PDF]
Jaywant SA, Arif KM.
europepmc +1 more source
A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security. [PDF]
Mihaljević MJ.
europepmc +1 more source
A fine-grained reversible data hiding in encrypted domain based on the cipher-text redundancy of encryption process. [PDF]
Kong YJ +5 more
europepmc +1 more source
Medical Image Encryption: An Application for Improved Padding Based GGH Encryption Algorithm. [PDF]
Sokouti M, Zakerolhosseini A, Sokouti B.
europepmc +1 more source
A Review of Agentic AI in Cybersecurity: Cognitive Autonomy, Ethical Governance, and Quantum-Resilient Defense. [PDF]
Adabara I +4 more
europepmc +1 more source
Collaborative penetration testing suite for emerging generative AI algorithms. [PDF]
Radanliev P.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Efficient Decryption Architecture for Classic McEliece
2023 24th International Symposium on Quality Electronic Design (ISQED), 2023As one of the candidates evaluated in the process of the National Institute of Standards and Technology (NIST) post-quantum cryptography standardization, the Classic McEliece, is being widely studied for its strong security.
Xinyuan Qiao +3 more
semanticscholar +2 more sources

