Results 101 to 110 of about 4,957 (182)

Pathways to the co-management of protected areas and native title in Australia [PDF]

open access: yes
In recent decades, various forms of co-management of national parks and other protected areas by governments and Indigenous people have come to the fore.
Chris Haynes   +2 more
core  

Security Analysis of DBTRU Cryptosystem. [PDF]

open access: yesEntropy (Basel), 2022
Tong X, Bi J, Duan Y, Li L, Wang L.
europepmc   +1 more source

Varianten des NTRU-Kryptosystems

open access: yes, 2012
Die vorliegende Arbeit behandelt das NTRU-Kryptosystem, welches zu den Public-Key-Kryptosystemen gehört. Bei den Public-Key-Kryptosystemen gibt es jeweils einen öffentlichen Schlüsselanteil zum verschlüsseln und einen passenden geheimen Schlüsselanteil, der zum Entschlüsseln benötigt wird.
openaire   +2 more sources

Calculation of complexity of NTRU and optimized NTRU using GA, ACO, and PSO algorithm

open access: yesSecurity and Communication Networks, 2016
AbstractA great security of information for the e‐business applications is required. In such applications, use of cryptographic methods is very necessary. The two popularly used cryptographic methods are secret key cryptosystem and public key cryptosystem. Data encryption standard is the most popular secret key cryptosystem.
Himani Agrawal, Monisha Sharma
openaire   +1 more source

Integrated NTT-Karatsuba for fast multiplication of NTRU Algorithm

open access: yesJITeCS (Journal of Information Technology and Computer Science)
The increasing threat of attacks from quantum computers requires the development of more efficient and secure post-quantum cryptographic algorithms, one of which is NTRU.
Muhammad Fathan Rivaldi   +2 more
doaj   +1 more source

Post-Quantum Security: Opportunities and Challenges. [PDF]

open access: yesSensors (Basel), 2023
Li S   +7 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy