Showing 81 - 100 results of 4,079 for search '"cryptography"', query time: 0.09s Refine Results
  1. 81
  2. 82
  3. 83
  4. 84
  5. 85

    Use of Cryptography in Cloud Computing by Jaber, Aws Naser, Mohamad Fadli, Zolkipli

    Published 2013
    “…Therefore, in this paper different cryptography aspects that pose a threat to cloud computing are reviewed. …”
    Get full text
    Conference or Workshop Item
  6. 86

    Cryptography using Automata Theory by Vayadande Kuldeep, Agarwal Kirti, Kabra Aadesh, Gangwal Ketan, Kinage Atharv

    Published 2022-01-01
    “…Encryption and decryption are the two most crucial components of cryptography. Data protection is the main objective of both systems. …”
    Get full text
    Article
  7. 87
  8. 88
  9. 89

    Artificial intelligence and quantum cryptography by Petar Radanliev

    Published 2024-02-01
    “…This summary highlights the key themes in the intersection of AI and quantum cryptography, including the potential benefits of AI-driven cryptography, the challenges that need to be addressed, and the prospects of this interdisciplinary research area.…”
    Get full text
    Article
  10. 90

    Subliminal Channels in Visual Cryptography by Katarzyna Koptyra, Marek R. Ogiela

    Published 2022-09-01
    Subjects: “…visual cryptography…”
    Get full text
    Article
  11. 91

    Cryptography from information loss

    Published 2021
    “…We show that such reductions, when they exist, have interesting and powerful consequences for lifting hardness into “useful” hardness, namely cryptography. Our first, conceptual, contribution is a definition of lossy reductions in the language of mutual information. …”
    Get full text
    Article
  12. 92

    Cryptography from information loss by Ball, Marshall, Boyle, Elette, Degwekar, Akshay Dhananjai, Deshpande, Apoorvaa, Rosen, Alon, Vaikuntanathan, Vinod, Vasudevan, Prashant Nalini

    Published 2022
    “…We show that such reductions, when they exist, have interesting and powerful consequences for lifting hardness into “useful” hardness, namely cryptography. Our first, conceptual, contribution is a definition of lossy reductions in the language of mutual information. …”
    Get full text
    Article
  13. 93
  14. 94
  15. 95

    Genus two isogeny cryptography by Flynn, E, Ti, Y

    Published 2019
    Conference item
  16. 96

    CRYPTOGRAPHY - BEATING THE CODE BREAKERS by Ekert, A

    Published 1992
    Journal article
  17. 97

    Eavesdropping on practical quantum cryptography by Williamson, M, Vedral, V

    Published 2003
    “…Practical implementations of quantum cryptography use attenuated laser pulses as the signal source rather than single photons. …”
    Journal article
  18. 98

    Free will in device-independent cryptography by Pope, JE

    Published 2014
    “…<p>Device-independent cryptography provides security in various tasks whilst removing an assumption that cryptographers previously thought of as crucial -- complete trust in the machinations of their experimental apparatus. …”
    Thesis
  19. 99

    Artificial intelligence and quantum cryptography by Radanliev, P

    Published 2024
    “…This summary highlights the key themes in the intersection of AI and quantum cryptography, including the potential benefits of AI-driven cryptography, the challenges that need to be addressed, and the prospects of this interdisciplinary research area.…”
    Journal article
  20. 100

    QUANTUM CRYPTOGRAPHY AND BELL THEOREM by Ekert, A

    Published 1992
    Conference item