Search Results - "cryptography."
-
1
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Subjects: “…Cryptography…”
Get full text
Get full text
-
2
-
3
Cryptanalysis of RSA and its variants using continuous midpoint subdivision analysis and lattices
Published 2021Subjects: “…Cryptography…”
Get full text
Get full text
-
4
Cryptanalysis of polynomial reconstruction problem based cryptosystems
Published 2023Subjects: “…Post-quantum cryptography…”
Get full text
Get full text
-
5
-
6
-
7
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015Subjects: “…Cryptography…”
Get full text
Get full text
-
8
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
Published 2014Subjects: “…Cryptography - Mathematics…”
Get full text
Get full text
-
9
New directions in forging multivariate signature schemes
Published 2023Subjects: Get full text
Get full text
-
10
Steganography For Embedding Data In Digital Image
Published 2003Subjects: “…Cryptography - Equipment and Supplies…”
Get full text
Get full text
-
11
Extention and cryptanalysis of golden cryptography
Published 2015Subjects: Get full text
Get full text
-
12
Cryptanalysis of El-Gamal AAs cryptosystem
Published 2011Subjects: “…Cryptography…”
Get full text
Get full text
-
13
Side channel analysis on AAᵝ cryptosystem and a signing scheme based on bivariate function hard problem and discrete logarithm problem
Published 2015Subjects: “…Cryptography…”
Get full text
Get full text
-
14
-
15
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019Subjects: “…Cryptography…”
Get full text
Get full text
-
16
Annihilators through fault injection analysis on selected stream ciphers
Published 2019Subjects: “…Cryptography…”
Get full text
Get full text
-
17
Musical Cryptography: Codes, Ciphers, Form, and Function
Published 2024Subjects: “…musical cryptography…”
Get full text
-
18
Some statistical simulation results over the 128-bit block cipher CLEFIA
Published 2009Subjects: “…Cryptography…”
Get full text
Get full text
-
19
-
20
Secure block cipher inspired by the human immune system
Published 2012Subjects: “…Cryptography…”
Get full text
Get full text