Showing 21 - 40 results of 40 for search '"cryptogram"', query time: 0.09s Refine Results
  1. 21

    Development of an improved method for forming pseudorandom numbers based on redunte M-ary codes by Р.В. Корольов, А.М. Ткачов, Н.І. Воропай, М. Мамедов, Е. Багіров

    Published 2022-02-01
    “…On the strength of pseudo-random number generators, symmetric flow cryptosystems are formed that ensure the strength of the cryptogram. The article analyzes the methods for constructing symmetric stream cryptosystems, proposes cryptographic generators of pseudo-random number sequences (PRNGs), the security of which is based on the complexity-theoretic problem of syndromic decoding. …”
    Get full text
    Article
  2. 22

    Demonstration of quantum-digital payments by Peter Schiansky, Julia Kalb, Esther Sztatecsny, Marie-Christine Roehsner, Tobias Guggemos, Alessandro Trenti, Mathieu Bozzio, Philip Walther

    Published 2023-06-01
    “…Current technology substitutes customers’ sensitive data by randomized tokens, and secures the payment’s uniqueness with a cryptographic function, called a cryptogram. However, computationally powerful attacks violate the security of these functions. …”
    Get full text
    Article
  3. 23

    HiCoACR: A reconfiguration decision-making model for reconfigurable security protocol based on hierarchically collaborative ant colony by Zhuo Yi, Ying Liao, Xuehui Du, Xin Lu, Lifeng Cao

    Published 2020-03-01
    “…While the Worker schedules most suitable cryptogram resources for each sub-goal received and produces the optimal reconfiguration solution which is verified and re-optimized by a Lévy process–based stochastic gradient descent algorithm. …”
    Get full text
    Article
  4. 24

    Complete Separable Reversible Data Hiding for Encrypted Digital Images Using Code Division Multiplexing with Versatile Bit Depth Management by David Mata-Mendoza, Diana Nuñez-Ramirez, Manuel Cedillo-Hernandez, Mariko Nakano-Miyatake, Hector Perez-Meana

    Published 2023-02-01
    “…This paper presents a complete separable RDH-ED scheme, whose main contribution is allowing the receiver to extract data and restore the image, either from the cryptogram with hidden data or from the directly decrypted version. …”
    Get full text
    Article
  5. 25

    Automatic vowels selection and ranking in Russian enciphered texts by Yuri I. Petrenko

    Published 2018-03-01
    “…The purpose of training is to learn how to extract redundant information of the text and to descript the cryptogram without a password. One of the most comfortable methods for learning is a simple substitution and similar encryption systems, which are presented in most courses of cryptography. …”
    Get full text
    Article
  6. 26

    Behind the Mask – An Inquiry into the Shakespeare Authorship Question by Peter Sturrock, Kathleen E Erickson

    Published 2020-06-01
    “…Keywords: Shakespeare, Edward de Vere, William Shakspere, cryptograms, Cardano Grille…”
    Get full text
    Article
  7. 27
  8. 28

    Надписите от Надсентмиклош и тяхната културно-историческа характеристика by Pavel Georgiev

    Published 2021-12-01
    “…The concepts and names decoded (Tetragrammatôn, Hexagrammatôn, Eôn, Five/the Fifth Eon, Hiueh, Eueh and others) allow establishing that they are cryptograms, attested in the ideas about the God of Gnostic Christians in the first centuries AD in the Middle East. …”
    Get full text
    Article
  9. 29

    Надписите от Надсентмиклош и тяхната културно-историческа характеристика by Pavel Georgiev

    Published 2021-12-01
    “…The concepts and names decoded (Tetragrammatôn, Hexagrammatôn, Eôn, Five/the Fifth Eon, Hiueh, Eueh and others) allow establishing that they are cryptograms, attested in the ideas about the God of Gnostic Christians in the first centuries AD in the Middle East. …”
    Get full text
    Article
  10. 30

    OCAS - On-line Cryptanalytic Aid System by Edwards, Daniel James

    Published 2023
    “…A programming system is proposed which will permit a cryptanalyst to write and debug programs to aid in he solution of cryptograms or cryptographic systems. The basic elements of the proposed programming system are discussed in detail. …”
    Get full text
  11. 31

    Checklist of plant species of the coastal fynbos and rocky head­lands, south of George, South Africa by J. E. Victor, D. B. Hoare, R. A. Lubke

    Published 2000-02-01
    “…A checklist of vascular plants and cryptograms was compiled for the fynbos and rocky headland communities of the coastal region south of George The area studied is a 12 km stretch of steep sandstone cliffs forming alternating bays and headlands situated between Glentana and Wilderness. …”
    Get full text
    Article
  12. 32

    A New Modified MARS Cryptosystem Based on Niho Exponent with an Enhanced S-Box Generation by Fatma Ahmed, Dalia H. Elkamchouchi

    Published 2022-07-01
    “…Even though they were created to provide data confidentiality, their adaptability grants them to be utilized in the creation of various cryptological techniques, including message authentication protocols, hash functions, and stream cryptograms. MARS is a symmetric shared-key block cryptosystem that supports 128-bit blocks and keys with sizes ranging from 128 to 448 bits. …”
    Get full text
    Article
  13. 33

    Information Security Protection of Internet of Energy Using Ensemble Public Key Algorithm under Big Data by Baode Lin, Zhenwei Geng, Fengrong Yu

    Published 2023-01-01
    “…Then, the security of the two cryptograms is certified against the two cyberattack modes. …”
    Get full text
    Article
  14. 34

    The Role of Cryptogams in Soil Property Regulation and Vascular Plant Regeneration: A Review by Meixue Qu, Wenbiao Duan, Lixin Chen

    Published 2023-12-01
    “…However, in areas with high annual precipitation (>600 mm) or where the soil has other water sources, the presence of cryptograms is conducive to soil water accumulation. …”
    Get full text
    Article
  15. 35

    Religion amidst Tares and Weeds: A Pentecostal Perspective on the Hegemony of Non-Religious Movements and Scholarship on Religion in the 21st Century by Kwasi Atta Agyapong

    Published 2022-11-01
    “…Religion is an influential and resilient phenomenon that parades no cryptograms of decline. It incites the deepest obligation, emotion, sharp action, strong dialogues and study for practitioners, opponents and fence-sitters. …”
    Get full text
    Article
  16. 36

    The 19th century Old Believers’ chased icon “Cross of Calvary” as a heritage of Old Russian Staurotheke by Valeriy V. Igoshev

    Published 2022-03-01
    “…The chased icon compositional construction and the inscriptions-cryptograms are similar to the wood-carved Old Believers’ icons of the 18th — 19th centuries made by masters of the Russian North. …”
    Get full text
    Article
  17. 37
  18. 38

    A Novel Blockchain and Bi-Linear Polynomial-Based QCP-ABE Framework for Privacy and Security over the Complex Cloud Data by Kranthi Kumar Singamaneni, Kadiyala Ramana, Gaurav Dhiman, Saurabh Singh, Byungun Yoon

    Published 2021-11-01
    “…Numerous obsolete ABE techniques are practical when applied to small data sets to generate cryptograms with restricted computational properties; their properties are used to generate the key, encrypt it, and decrypt it. …”
    Get full text
    Article
  19. 39

    A new quality index based on soil-vegetation networks to determine the recovery of functionality in abandoned agrosystems by Juan Pedro Martín-Sanz, Inmaculada Valverde-Asenjo, Miguel Ángel Casermeiro, José Antonio Molina, José Ramón Quintana

    Published 2024-01-01
    “…Total vegetation cover, cover of cryptograms and phanerogams and cover of plant functional groups was also recorded. …”
    Get full text
    Article
  20. 40

    Development of security mechanisms for scada systems in the postquantium period by О. В. Воропай, С. С. Погасій, О. Г. Король, С. В. Мілевський

    Published 2022-06-01
    “…The developed approach provides the ability to hide elements of management commands, and the use of different channels provides the ability to hide individual elements of cryptograms. The use of post-quantum encryption algorithms provides a significant increase in the cryptographic stability of security mechanisms SCADA-systems.…”
    Get full text
    Article