-
1
Another Cryptogram in "Shakespeare's" Dedication to His Sonnets
Published 2021-03-01Subjects: Get full text
Article -
2
Differential fault analysis on EMV application cryptogram
Published 2016-04-01Subjects: Get full text
Article -
3
-
4
Four seasons of documentation in the Main Sanctuary of Amun-Re in the Temple of Hatshepsut at Deir el-Bahari
Published 2016-12-01Subjects: Get full text
Article -
5
Hidden Ekphrasis in the Works of Miroslav Krleža
Published 2017-07-01Subjects: Get full text
Article -
6
-
7
Michael and other archangels behind an eight-pointed cross-symbol from Medieval Nubia: A view from Sai Island in northern Sudan
Published 2021-06-01Subjects: Get full text
Article -
8
Исследование познавательного интереса к математике на основе занимательных заданий в десятом классе...
Published 2021-04-01Subjects: Get full text
Article -
9
-
10
A Novel LSB Matching Algorithm Based on Information Pre-Processing
Published 2021-12-01Get full text
Article -
11
Sentiment Classification for Chinese Text Based on Interactive Multitask Learning
Published 2020-01-01Get full text
Article -
12
From perfect secrecy to perfect safety & security: Cryptography-based analysis of endogenous security
Published 2023-01-01“…Since the attackers are required to have the new powerful ability to crack the structure cryptogram, the threshold of cyber security is raised to at least the same level as cryptogram deciphering, thereafter the ubiquitous cyber threats are destined to be significantly reduced.…”
Get full text
Article -
13
APPLICATION OF ANT COLONY ALGORITHM FOR REALIZATION OF TRANSPOSITION CIPHERS CRYPT ANALYSIS
Published 2018-07-01“…Its application to the plain text results in the cryptogram received by shifting symbols of the plain text in a certain order. …”
Get full text
Article -
14
APPLICATION OF ANT COLONY ALGORITHM FOR REALIZATION OF TRANSPOSITION CIPHERS CRYPT ANALYSIS
Published 2011-02-01“…Its application to the plain text results in the cryptogram received by shifting symbols of the plain text in a certain order. …”
Get full text
Article -
15
Locura y pensamiento periférico en la poesía de Leopoldo María Panero. Una lectura desde Foucault
Published 2022-07-01“…As in Artaud or Blanchot, in Leopoldo María Panero we find ourselves before a writing from the outside, from the subject split in its rhizomatic becomings, using the terminology of Deleuze and Guattari, in which the signifier is deterritorialized and decoded, for which he uses logophagic procedures such as the ostracon, the hapax or the cryptogram.…”
Article -
16
The cult and tomb of patriarch Pajsije – new findings and interpretations
Published 2021-01-01“…Besides a painted cryptogram, the head also includes an extensive inscription with information about Pajsije’s title, time of reign, date of death and place of burial. …”
Get full text
Article -
17
Provably sender-deniable encryption scheme
Published 2015-05-01“…In the proposed new sender-deniable encryption scheme the cryptogram is computed as coefficients of quadratic congruence, the roots of which are two simultaneously encrypted texts. …”
Get full text
Article -
18
Simulation of a Homomorphic Encryption System
Published 2020-04-01“…Finally, it will send back the result, and whoever has the proper deciphering key can decrypt the cryptogram correctly. The decrypted result will be equal to the intended computed value. …”
Get full text
Article -
19
Breaking Data Encryption Standard with a Reduced Number of Rounds Using Metaheuristics Differential Cryptanalysis
Published 2021-12-01“…Knowing the last subkey, it is possible to recreate the complete encryption key and thus decrypt the cryptogram. The suggested approach makes it possible to automatically reject solutions (keys) that represent the worst fitness function, owing to which we are able to significantly reduce the attack search space. …”
Get full text
Article -
20
Research on the Chinese Financial IC Card Standard supporting EMV protocol(中国金融IC卡规范对EMV的支持性研究)
Published 2007-01-01“…分析了《中国金融集成电路(IC)卡规范》(以下简称“中国金融IC卡规范”)与国际智能卡金融支付应用标准EMV规范之间的差异,通过对中国金融IC卡圈存交易流程进行改进,在不增加IC卡命令的基础上,实现了EMV规范中GENERATE APPLICATION CRYPTOGRAM、GET DATA和GET PROCESSING OPTIONS三条命令的功能,大大增强了规范的可操作性,同时也验证了中国金融IC卡规范对EMV标准的支持.…”
Get full text
Article