Showing 4,061 - 4,079 results of 4,079 for search '"cryptography"', query time: 0.12s Refine Results
  1. 4061

    Secure channel free public key encryption with multiple keywords search by Ma, Yang

    Published 2020
    “…With a further exploration of modern cryptography, people realize that Public Key Infrastructure (PKI) is not perfect but has its limitations. …”
    Get full text
    Thesis
  2. 4062

    On the Thermal Models for Resistive Random Access Memory Circuit Simulation by Juan B. Roldán, Gerardo González-Cordero, Rodrigo Picos, Enrique Miranda, Félix Palumbo, Francisco Jiménez-Molinos, Enrique Moreno, David Maldonado, Santiago B. Baldomá, Mohamad Moner Al Chawa, Carol de Benito, Stavros G. Stavrinides, Jordi Suñé, Leon O. Chua

    Published 2021-05-01
    “…Resistive Random Access Memories (RRAMs) are based on resistive switching (RS) operation and exhibit a set of technological features that make them ideal candidates for applications related to non-volatile memories, neuromorphic computing and hardware cryptography. For the full industrial development of these devices different simulation tools and compact models are needed in order to allow computer-aided design, both at the device and circuit levels. …”
    Get full text
    Article
  3. 4063

    A Comparative look to the Recall method of Personality of Halaj in the poem Shafi'ee kadkani and Salah Abdul Sabour by Ahmad Yazdi, Abolghasem Amirahmadi, Ali Eshghi Sardehi

    Published 2020-02-01
    “…Thirdly, it is intended in the playful spirits of the playwright's spirits and avoids poetic artifacts, but in the non-visual poetry in which the mask is used, ambiguity and cryptography is a literary value. The ambiguity, "is the essence of pure and enduring literature, and for the literary context, value and virtue." …”
    Get full text
    Article
  4. 4064

    More Constructions of Light MDS Transforms Based on Known MDS Circulant Matrices by Jin-Bo Wang, You Wu, Yu Zhou

    Published 2022-07-01
    “…Maximum distance separable (MDS) codes have the maximum branch number in cryptography, and they are generally used in diffusion layers of symmetric ciphers. …”
    Get full text
    Article
  5. 4065

    Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication by Shimaa A. Abdel Hakeem, HyungWon Kim

    Published 2022-01-01
    “…However, most of them suffer from high communication and computation costs due to the complex elliptic curve and bilinear pairing cryptography. Many shared secret protocols have been proposed using polynomial evaluation and interpolation to solve the previous complexity issues. …”
    Get full text
    Article
  6. 4066

    Modern Interactive Proofs by Holden, Dhiraj

    Published 2022
    “…Non-signaling proofs, have found applications in cryptography and hardness of approximation. An important open problem is characterizing the power of non-signaling proofs. …”
    Get full text
    Thesis
  7. 4067

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…This thesis examines how fractal image coding is used in biometric cryptography for personal face authentication. This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
    Get full text
    Thesis
  8. 4068

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…These challenges are: 1) single point failure in the cryptography scheme, 2) key abuse problem in the key generating process, and 3) delayed access to the data in the cloud for the user. …”
    Get full text
    Thesis
  9. 4069

    Fundamentals of Color Symbolization in Shia and Sunni Theosophy and the Application Patterns in Shia and Sunni Monastery-mausoleums in Iran (Focusing on Monastery-mausoleums of th... by mansooreh mohseni, Mehdi Hamzenejad

    Published 2021-12-01
    “…In fact, in the case of color interpretation, a kind of cryptography must be used. Decoding the secrets of colors and their interpretations throughout our visual world, including the nature as well as manmade symbols would be possible through the religious knowledge enclosed in the hearts of the sages and mystics. …”
    Get full text
    Article
  10. 4070
  11. 4071
  12. 4072
  13. 4073

    Sequences over Finite Fields Defined by OGS and BN-Pair Decompositions of <i>PSL</i><sub>2</sub>(<i>q</i>) Connected to Dickson and Chebyshev Polynomials by Robert Shwartz, Hadas Yadayi

    Published 2023-02-01
    “…The factorization of groups into a Zappa–Szép product, or more generally into a <i>k</i>-fold Zappa–Szép product of its subgroups, is an interesting problem, since it eases the multiplication of two elements in a group and has recently been applied to public-key cryptography. We provide a generalization of the <i>k</i>-fold Zappa–Szép product of cyclic groups, which we call <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>O</mi><mi>G</mi><mi>S</mi></mrow></semantics></math></inline-formula> decomposition. …”
    Get full text
    Article
  14. 4074
  15. 4075

    l by Shima Hamidi, alireza qaeminia, MohammadAli Rezaei Isfahani

    Published 2023-03-01
    “…Examining the linguistic functions of the word "Ayeh" in various instances by using Jacobsen's communication model in semiotics proves common features such as having the occult aspect, reflection, and common referential function for cryptography…”
    Get full text
    Article
  16. 4076

    Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation by Mahmood A. Al-Shareeda, Selvakumar Manickam

    Published 2022-07-01
    “…Finally, by using symmetry or asymmetry cryptographies, our proposal will avoid MITM attacks that intercept the communication between legal nodes.…”
    Get full text
    Article
  17. 4077

    CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks by Mahmood A. Al-Shareeda, Selvakumar Manickam, Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi, Amjad Qtaish, Abdullah J. Alzahrani, Gharbi Alshammari, Amer A. Sallam, Khalil Almekhlafi

    Published 2022-07-01
    “…The security and privacy concerns in vehicular communication are often faced with schemes depending on either elliptic curve (EC) or bilinear pair (BP) cryptographies. However, the operations used by BP and EC are time-consuming and more complicated. …”
    Get full text
    Article
  18. 4078

    Design and implementation of MD5 hash function algorithm using verilog HDL by Shamsiah, Suhaili, Niam, Cleopatra Chundang, Zainah, Md Zain, Norhuzaimin, Julai

    Published 2022
    “…Hash functions are one of the cryptographies that can be used in both security design applications and protocol suites. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 4079

    Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage Model by Tung-Tso Tsai, Yuh-Min Tseng, Sen-Shan Huang, Jia-Yi Xie, Ying-Hao Hung

    Published 2022-01-01
    “…In the past, numerous MRSC and AMRSC schemes based on various public-key cryptographies (i.e., public key infrastructure (PKI)-based, identity (ID)-based and certificateless (CL)) were proposed. …”
    Get full text
    Article