The following pages link to (Q4335813):
Displaying 40 items.
- Evolutionary ciphers against differential power analysis and differential fault analysis (Q362183) (← links)
- Decidability of equivalence of symbolic derivations (Q437031) (← links)
- Applying LU decomposition of matrices to design anonymity bilateral remote user authentication scheme (Q474740) (← links)
- On min-max \(r\)-gatherings (Q627109) (← links)
- A generic framework for anonymous authentication in mobile networks (Q744321) (← links)
- Decrypting classical cipher text using Markov chain Monte Carlo (Q746218) (← links)
- Bisplitting an arbitrary \(N\)-qubit state with a class of asymmetric three-qubit W states (Q842607) (← links)
- Protocol completion incentive problems in cryptographic Vickrey auctions (Q934962) (← links)
- The concept of decentralized and secure electronic marketplace (Q934966) (← links)
- On multiple transitivity for products of sets of permutations. (Q950834) (← links)
- A secure and robust hash-based scheme for image authentication (Q985467) (← links)
- Knowledge condition games (Q1006447) (← links)
- Quantum bit-commitment for small storage based on quantum one-way permutations (Q1880339) (← links)
- Quantum secret sharing of secure direct communication using one-time pad (Q1930060) (← links)
- Cryptanalysis of quantum blind signature scheme (Q1945648) (← links)
- Implementation of quantum secret sharing and quantum binary voting protocol in the IBM quantum computer (Q2677577) (← links)
- (Q2741450) (← links)
- Generalization of the Self-Shrinking Generator in the Galois Field (Q3005104) (← links)
- Identification scheme for romanized Indian languages from their plain and ciphered bit stream (Q3008552) (← links)
- On a family of preimage-resistant functions (Q3075868) (← links)
- An Introduction to Security API Analysis (Q3092171) (← links)
- (Q3153088) (← links)
- The Multics encipher_Algorithm (Q3183947) (← links)
- A Simplified IDEA Algorithm (Q3183964) (← links)
- A note on chaotic unimodal maps and applications (Q3531636) (← links)
- Generation of pseudorandom sequence over elliptic curve group and their properties (Q3542560) (← links)
- How to Fill Up Merkle-Damgård Hash Functions (Q3600380) (← links)
- The Power of Anonymous Veto in Public Discussion (Q3627418) (← links)
- Extended DSA (Q3637784) (← links)
- Bounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number Generators (Q3644215) (← links)
- An N-D cryptoscheme (Q4546028) (← links)
- Agent based scientific simulation and modeling (Q4789971) (← links)
- Key exchange protocols over noncommutative rings. The case of (Q4903468) (← links)
- A Modified Technique for Reliable Image Encryption Method using Merkle-Hellman Cryptosystem and Rsa Algorithm (Q5069678) (← links)
- Encryption and Fragmentation for Data Confidentiality in the Cloud (Q5253591) (← links)
- Comments on e-mail protocols providing forward secrecy (Q5307759) (← links)
- Proved Random Numbers Obtained from Hardware Devices (Q5415900) (← links)
- On Min-Max r-Gatherings (Q5443378) (← links)
- Faster Multicollisions (Q5504611) (← links)
- A fair and efficient solution to the socialist millionaires' problem (Q5939234) (← links)