-
1
Designing Hardware for Cryptography and Cryptography for Hardware
Published 2023Get full text
Article -
2
Chaos Based Cryptography An Alternative to Algebraic Cryptography
Published 2008“…We will discuss the earliest form of cryptography before fast forwarding to the current modem forms of cryptography. …”
Get full text
Article -
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
-
13
-
14
-
15
-
16
Communications cryptography
Published 2004“…This paper focuses on the analysis of the two types of key cryptography exists, based on the availability of the key publicly: Private key Cryptography, and Public Key Cryptography. …”
Get full text
Proceeding Paper -
17
-
18
-
19
-
20
Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography
Published 2018-04-01Subjects: “…Adversarial Neural Cryptography…”
Get full text
Article