-
181
Implementation of RSA cryptography algorithm for encryption and decryption /
Published 2006Subjects: -
182
-
183
Cryptography, Steganography, & Digital Watermarking for Text Documentation
Published 2020“…This paper is about three techniques used in securing text documents, cryptography, steganography, and digital watermarking. …”
Get full text
Get full text
Conference or Workshop Item -
184
Boosting device-independent cryptography with tripartite nonlocality
Published 2023-04-01Get full text
Article -
185
THEORETICAL ASSUMPTIONS FOR AN INTRODUCTION TO ELLIPTIC CURVE CRYPTOGRAPHY
Published 2023-11-01“…This article provides an overview of the theoretical assumptions that are necessary for the development of cryptographic algorithms based on elliptic curve cryptography, which includes defining elliptic curves, defining the properties of arithmetic operations on elliptic curves used in cryptography with reference to curves defined over finite fields.…”
Get full text
Article -
186
-
187
Threshold Visual Cryptography Schemes With Tagged Shares
Published 2020-01-01Subjects: “…Visual cryptography scheme…”
Get full text
Article -
188
-
189
The Dichotomy of Neural Networks and Cryptography: War and Peace
Published 2022-06-01Subjects: Get full text
Article -
190
Acknowledgement to Reviewers of <i>Cryptography</i> in 2019
Published 2020-01-01“…Cryptography…”
Get full text
Article -
191
A Survey on DNA-Based Cryptography and Steganography
Published 2023-01-01Subjects: Get full text
Article -
192
Dynamic Access Control Through Cryptography in Cloud
Published 2023-01-01“…DAC in cryptography includes file encryption with a well- formed key list that document a file key and a set of lock keys. …”
Get full text
Article -
193
Applications of Neural Network-Based AI in Cryptography
Published 2023-08-01Subjects: Get full text
Article -
194
Quantum Cryptography Simulation of Entanglement and Quantum Teleportation
Published 2023-06-01Get full text
Article -
195
Cryptography: Advances in Secure Communication and Data Protection
Published 2023-01-01“…This abstract examines the evolution of secure communication protocols and data protection techniques as it relates to the advancements in cryptography. The development of post-quantum cryptography is the most notable development in cryptography discussed in this study. …”
Get full text
Article -
196
Generalized Fibonacci Sequences for Elliptic Curve Cryptography
Published 2023-11-01Get full text
Article -
197
Condensed DNA Nanosphere for DNA Origami Cryptography
Published 2023-11-01“…Condensing DNA into the nanosphere that is used for DNA origami cryptography has the potential to be used in harsh conditions with higher confidentiality and integrity for the transmitted messages.…”
Get full text
Article -
198
Stokes meta-hologram toward optical cryptography
Published 2022-11-01“…Achieving optical cryptography scheme with both high capacity and security is highly desirable. …”
Get full text
Article -
199
Security for wireless sensor networks using cryptography
Published 2023-10-01Subjects: Get full text
Article -
200
A Mathematical Perspective on Post-Quantum Cryptography
Published 2022-07-01Subjects: “…post-quantum cryptography…”
Get full text
Article