Showing 1 - 20 results of 40 for search '"cryptogram"', query time: 0.13s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    From perfect secrecy to perfect safety & security: Cryptography-based analysis of endogenous security by Jin Liang, Hu Xiaoyan, Wu Jiangxing

    Published 2023-01-01
    “…Since the attackers are required to have the new powerful ability to crack the structure cryptogram, the threshold of cyber security is raised to at least the same level as cryptogram deciphering, thereafter the ubiquitous cyber threats are destined to be significantly reduced.…”
    Get full text
    Article
  13. 13

    APPLICATION OF ANT COLONY ALGORITHM FOR REALIZATION OF TRANSPOSITION CIPHERS CRYPT ANALYSIS by Vladimir A. Fatkhi, Alexander S. Sergeyev

    Published 2018-07-01
    “…Its application to the plain text results in the cryptogram received by shifting symbols of the plain text in a certain order. …”
    Get full text
    Article
  14. 14

    APPLICATION OF ANT COLONY ALGORITHM FOR REALIZATION OF TRANSPOSITION CIPHERS CRYPT ANALYSIS by Vladimir A. Fatkhi, Alexander S. Sergeyev

    Published 2011-02-01
    “…Its application to the plain text results in the cryptogram received by shifting symbols of the plain text in a certain order. …”
    Get full text
    Article
  15. 15

    Locura y pensamiento periférico en la poesía de Leopoldo María Panero. Una lectura desde Foucault by Rafael Antúnez Arce

    Published 2022-07-01
    “…As in Artaud or Blanchot, in Leopoldo María Panero we find ourselves before a writing from the outside, from the subject split in its rhizomatic becomings, using the terminology of Deleuze and Guattari, in which the signifier is deterritorialized and decoded, for which he uses logophagic procedures such as the ostracon, the hapax or the cryptogram.…”
    Article
  16. 16

    The cult and tomb of patriarch Pajsije – new findings and interpretations by Popović Danica

    Published 2021-01-01
    “…Besides a painted cryptogram, the head also includes an extensive inscription with information about Pajsije’s title, time of reign, date of death and place of burial. …”
    Get full text
    Article
  17. 17

    Provably sender-deniable encryption scheme by N.A. Moldovyan, A.A. Moldovyan, V.A. Shcherbacov

    Published 2015-05-01
    “…In the proposed new sender-deniable encryption scheme the cryptogram is computed as coefficients of quadratic congruence, the roots of which are two simultaneously encrypted texts. …”
    Get full text
    Article
  18. 18

    Simulation of a Homomorphic Encryption System by Bozduman Hanife Çağıl, Afacan Erkan

    Published 2020-04-01
    “…Finally, it will send back the result, and whoever has the proper deciphering key can decrypt the cryptogram correctly. The decrypted result will be equal to the intended computed value. …”
    Get full text
    Article
  19. 19

    Breaking Data Encryption Standard with a Reduced Number of Rounds Using Metaheuristics Differential Cryptanalysis by Kamil Dworak, Urszula Boryczka

    Published 2021-12-01
    “…Knowing the last subkey, it is possible to recreate the complete encryption key and thus decrypt the cryptogram. The suggested approach makes it possible to automatically reject solutions (keys) that represent the worst fitness function, owing to which we are able to significantly reduce the attack search space. …”
    Get full text
    Article
  20. 20

    Research on the Chinese Financial IC Card Standard supporting EMV protocol(中国金融IC卡规范对EMV的支持性研究) by LANGChun-hua(郎春华), WANGXiao-hai(王小海), ZHAOYun-feng(赵云峰)

    Published 2007-01-01
    “…分析了《中国金融集成电路(IC)卡规范》(以下简称“中国金融IC卡规范”)与国际智能卡金融支付应用标准EMV规范之间的差异,通过对中国金融IC卡圈存交易流程进行改进,在不增加IC卡命令的基础上,实现了EMV规范中GENERATE APPLICATION CRYPTOGRAM、GET DATA和GET PROCESSING OPTIONS三条命令的功能,大大增强了规范的可操作性,同时也验证了中国金融IC卡规范对EMV标准的支持.…”
    Get full text
    Article