Suggested Topics within your search.
Suggested Topics within your search.
QA75 Electronic computers. Computer science
7
TK Electrical engineering. Electronics Nuclear engineering
5
Gender studies, gender groups
4
History of engineering and technology
4
Coding theory & cryptology
3
Cryptography
3
History
3
Technology: general issues
3
Applied mathematics
2
Biblical studies & exegesis
2
Computer science
2
Humanities
2
Information technology industries
2
Philosophy: aesthetics
2
QA75.5-76.95 Electronic computers. Computer science
2
Sociology & anthropology
2
Sociology and anthropology
2
Theory of art
2
Trivium
2
5G mobile communication systems
1
A5-GMR-2 stream cipher
1
AES
1
Advanced technology
1
Art & design styles: Romanticism
1
Asian history
1
Authentication
1
Big Data Computing
1
Big data
1
Block Cipher
1
Block cipher
1
-
81by Evaristo José Madarro-Capó, Carlos Miguel Legón-Pérez , Omar Rojas, Guillermo Sosa-Gómez, Raisa Socorro-LlanesSubjects: “...stream cipher...”
Published 2020-10-01
Get full text
Article -
82
-
83
-
84by A.A. MoldovyanSubjects: “...flexible hardware cipher...”
Published 2001-02-01
Get full text
Article -
85by Ashutosh Dhar DwivediSubjects: “...Chaskey cipher...”
Published 2020-08-01
Get full text
Article -
86by Baghdad Science Journal“.... In this work, we implement an interaction between the feedforward neural network and the stream cipher, so...”
Published 2008-09-01
Get full text
Article -
87
-
88
-
89by Boey, Kean Hong“.... DPA attacks were performed on two block cipher encryption algorithms CAST-128 and SEED. These two...”
Published 2012
Get full text
-
90
-
91
-
92“...碩士 === 國立交通大學 === 資訊工程系 === 88 === The commonest stream cipher system uses a keystream generator...”
Get full text
Others -
93
-
94
-
95
-
96“... of the heterogeneity of the applications, a large variety of the security ciphers with high throughput, small area...”
Get full text
Others -
97“... to process data with privacy. We conduct experiments to study the efficiency of RSA ciphers in cloud...”
Get full text
Others -
98
-
99“.... Following our method, by acquiring an enough number of pairs of plain-images and cipher-images...”
Get full text
Others -
100