Search results

From MaRDI portal
Results 1 – 20 of 53,901
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Inequality and Rejected-data Protocols for Quantum Cryptography 2000-07-16 Paper The principles of quantum cryptography 1997-04-16 Paper Secure optical communications...
    10 bytes (20 words) - 02:34, 12 December 2023
  • distributed oblivious transfer 2007-08-20 Paper Coding and Cryptography 2007-05-02 Paper Visual cryptography schemes with optimal pixel expansion 2007-01-09 Paper...
    10 bytes (19 words) - 18:57, 9 December 2023
  • applications in cryptography 2016-12-02 Paper Higher Order Nonlinearity of Niho Functions 2016-05-11 Paper On $$(k, n)$$ Visual Cryptography Scheme with $$t$$...
    10 bytes (17 words) - 12:17, 11 December 2023
  • Paper Visual Cryptography Based Watermarking 2014-05-06 Paper Theoretical Computer Science 2010-02-23 Paper Ideal contrast visual cryptography schemes with...
    10 bytes (17 words) - 02:30, 13 December 2023
  • 2007-09-04 Paper Obfuscation for Cryptographic Purposes 2007-08-30 Paper Cryptography and Coding 2006-11-01 Paper Cryptography and Coding 2006-11-01 Paper Escrow-free...
    10 bytes (18 words) - 07:17, 13 December 2023
  • Quantum Channels 2017-05-16 Paper An Update on Quantum Cryptography 2017-04-10 Paper Quantum cryptography. II: How to re-use a one-time pad safely even if \(\mathrm...
    10 bytes (19 words) - 01:13, 10 December 2023
  • Optimal Visual Cryptography Schemes 2015-09-30 Paper On k -set consensus problems in asynchronous systems 2015-09-11 Paper Color visual cryptography schemes for...
    10 bytes (19 words) - 18:22, 11 December 2023
  • Type Number theory in science and communication. With applications in cryptography, physics, digital information, computing, and self-similarity 2006-02-28...
    10 bytes (18 words) - 22:41, 12 December 2023
  • ${\mathcal{MQ}}$ ) Public Key Cryptography 2007-09-04 Paper On the security of stepwise triangular systems 2006-11-22 Paper Cryptography and Coding 2006-11-01...
    10 bytes (18 words) - 02:45, 13 December 2023
  • 2008-08-29 Paper Practical Cryptography in High Dimensional Tori 2008-05-06 Paper Instruction Set Extensions for Pairing-Based Cryptography 2007-11-29 Paper Algorithmic...
    10 bytes (16 words) - 02:01, 13 December 2023
  • involutions 2017-09-05 Paper Visual Cryptography for Image Processing and Security 2016-02-09 Paper On $$(k, n)$$ Visual Cryptography Scheme with $$t$$ Essential...
    10 bytes (17 words) - 11:52, 6 October 2023
  • Visual Cryptography Scheme with $$t$$ Essential Parties 2015-09-30 Paper Threshold Secret Image Sharing 2014-09-29 Paper Flexible Visual Cryptography Scheme...
    10 bytes (16 words) - 13:01, 6 October 2023
  • for public-key cryptography on embedded microprocessors 2020-11-06 Paper Fast multi-precision multiplication for public-key cryptography on embedded microprocessors...
    10 bytes (16 words) - 23:41, 24 September 2023
  • Implementation of Cryptographic Pairings 2009-11-03 Paper Cryptographic Side-Channels from Low-Power Cache Memory 2008-03-07 Paper Applied Cryptography and Network...
    10 bytes (16 words) - 12:52, 6 October 2023
  • with applications to cryptography 2006-11-06 Paper Efficient hardware implementation of finite fields with applications to cryptography 2006-11-06 Paper Selected...
    10 bytes (16 words) - 13:53, 28 January 2024
  • Paper Public Key Cryptography - PKC 2006 2007-05-02 Paper Public Key Cryptography - PKC 2006 2007-05-02 Paper Public Key Cryptography - PKC 2005 2005-12-07...
    10 bytes (16 words) - 03:22, 7 October 2023
  • half-injective PRGs for incompressible white-box cryptography 2020-01-28 Paper White-box cryptography: don't forget about grey-box attacks 2019-11-27 Paper...
    10 bytes (18 words) - 20:09, 24 September 2023
  • for Public-Key Cryptography on Embedded Microprocessors 2011-10-07 Paper Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate...
    10 bytes (16 words) - 09:30, 6 October 2023
  • relationship between probabilistic visual cryptography and random grid 2017-02-02 Paper New extended visual cryptography schemes with clearer shadow images 2016-07-08...
    10 bytes (17 words) - 11:37, 6 October 2023
  • half-injective PRGs for incompressible white-box cryptography 2020-01-28 Paper White-box cryptography: don't forget about grey-box attacks 2019-11-27 Paper...
    10 bytes (16 words) - 20:09, 24 September 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)