Showing 21 - 40 results of 243 for search '"cryptographic key"', query time: 0.42s Refine Results
  1. 21
  2. 22
  3. 23
  4. 24
  5. 25
  6. 26

    GE vs GM: Efficient side-channel security evaluations on full cryptographic keys by Anca Rădulescu, Pantelimon G. Popescu, Marios O. Choudary

    Published 2022-08-01
    “… Security evaluations for full cryptographic keys is a very important research topic since the past decade. …”
    Get full text
    Article
  7. 27

    SOFTWARE TOOL FOR LOGICAL VALIDATION OF CRYPTOGRAPHIC KEY GENERATION PROTOCOLS BASED ON BAN-LOGIC by Nadezhda S. Mogilevskaya

    Published 2012-03-01
    “…The idea of analyzing cryptographic key generation protocols through BAN - logic methods is considered. …”
    Get full text
    Article
  8. 28

    GE vs GM: Efficient side-channel security evaluations on full cryptographic keys by Anca Rădulescu, Pantelimon G. Popescu, Marios O. Choudary

    Published 2022-08-01
    “… Security evaluations for full cryptographic keys is a very important research topic since the past decade. …”
    Get full text
    Article
  9. 29
  10. 30

    Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals by M. Zeynali, H. Seyedarabi, B. Mozaffari Tazehkand

    Published 2020-07-01
    “…We obtain 0.76%, and 0.48% mean Half Total Error Rate (HTER) for 18-channel and single-channel cryptographic key generation systems respectively.…”
    Get full text
    Article
  11. 31
  12. 32
  13. 33
  14. 34
  15. 35

    A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks by M. L. Radziukevich

    Published 2021-10-01
    “…This article discusses one of the ways to generate a common cryptographic key using synchronized artificial neural networks. …”
    Get full text
    Article
  16. 36
  17. 37
  18. 38
  19. 39
  20. 40