Search Results - "cryptographer"

Refine Results
  1. 1

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
  2. 2

    Cryptanalysis in cryptographic algorithm design by Z'aba, Muhammad Reza, Ahmad, Badrisham, Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…The aim of this paper is to create awareness on the importance of cryptanalysis when designing cryptographic algorithms. The strength of a cryptographic algorithm is not fully dependant on the length of the key. …”
    Get full text
  3. 3

    Broad view of cryptographic hash functions by Alahmad, Mohammad, Alshaikhli, Imad Fakhri Taha

    Published 2013
    “…Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. …”
    Get full text
    Get full text
  4. 4
  5. 5

    Computation of cryptographic keys from face biometrics by Goh,, A, Ngo,, DCL

    Published 2003
    “…We outline cryptographic key-computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable for cryptographic applicability. …”
    Get full text
  6. 6

    A Fast Incremental Cryptographic Hash Function by Goi , Bok Min

    Published 2003
    “…It turns out that fast cryptographic hash functions have been used extensively and become one of the most important cryptographic primitives. …”
    Get full text
  7. 7

    A Fast Incremental Cryptographic Hash Function by Goi, Bok Min

    Published 2003
    “…It turns out that fast cryptographic hash functions have been used extensively and become one of the most important cryptographic primitives. …”
    Get full text
  8. 8
  9. 9

    Cryptographic hash function: a high level view by Taha, Imad, Alahmad, Mohammad A.

    Published 2015
    “…Cryptographic hash function verifies data integrity and sender identity or source of information. …”
    Get full text
    Get full text
  10. 10

    A cryptographic one-to-many reversible mapping and it's applications by Hakiem, Nashrul, Siddiqi, Mohammad Umar

    Published 2014
    “…This paper presents a novel mechanism of cryptographic one-to-many reversible mapping between two domains and it's applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
  11. 11
  12. 12

    Mobile technology generations and cryptographic algorithms: analysis study by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2016
    “…This paper provides analysis study of Mobile generations (From Mobile 1G to Mobile 4G) and cryptographic algorithms used in these generations. The study based on some factors like features, services, standards, and techniques which have adopted in these generations.…”
    Get full text
    Get full text
    Get full text
  13. 13
  14. 14

    Personalised cryptographic key generation based on FaceHashing by TEOH, A

    Published 2004
    “…In the second stage, FaceHash is then securely reduced to a single cryptographic key via Shamir secret-sharing. Tokenised FaceHashing is rigorously protective of the face data, with security comparable to cryptographic hashing of token and knowledge key-factor. …”
    Get full text
    Get full text
  15. 15

    Entanglement, Einstein-Podolsky-Rosen steering and cryptographical applications by Kogias, Ioannis

    Published 2016
    “…We define an indicator of collective steering-type correlations, which is interpreted operationally in terms of the guaranteed secret key rate in the multi-party cryptographic task of quantum secret sharing. The final results look at the cryptographical task of quantum secret sharing, whose security has remained unproven almost two decades after its original conception. …”
    Get full text
  16. 16
  17. 17
  18. 18

    Cryptographic hash function: A high level view by Alkandari, Abdulaziz Ali, Alshaikhli, Imad Fakhri Taha, Alahmad, Mohammad A.

    Published 2013
    “…Cryptographic hash function verifies data integrity and sender identity or source of information. …”
    Get full text
    Get full text
  19. 19

    A review of cloud security based on cryptographic mechanisms by Abd, Sura Khalil, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Hashim, Fazirulhisyam, Abdullah, Azizol

    Published 2014
    “…Furthermore, solutions suggested by some researchers are presented with a focus on cryptographic techniques that approve secure cloud storage.…”
    Get full text
    Get full text
  20. 20

    Analysable Chaos-based Design Paradigms For Cryptographic Applications by Abba, Abubakar

    Published 2024
    “…This study proposes simple and analyzable paradigms based on well-established cryptographic principles (SPN and Feistel) to address these issues. …”
    Get full text
    Get full text