Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Decryption")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 438

  • Page / 18
Export

Selection :

  • and

Decryption-Decompression of AES Protected ZIP Files on GPUsNHAT DUONG, Tan; HONG PHAM, Phong; HUU NGUYEN, Due et al.Proceedings of SPIE, the International Society for Optical Engineering. 2011, Vol 8285, issn 0277-786X, isbn 978-0-8194-8932-6, 828568.1-828568.8, 3Conference Paper

The semipublic encryption for visual cryptography using Q'tron neural networksYUE, Tai-Wen; CHIANG, Suchen.Journal of network and computer applications. 2007, Vol 30, Num 1, pp 24-41, issn 1084-8045, 18 p.Conference Paper

Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domainXIAOGANG WANG; DAOMU ZHAO.Optics communications. 2011, Vol 284, Num 1, pp 148-152, issn 0030-4018, 5 p.Article

Double image encryption based on iterative fractional Fourier transformZHENGJUN LIU; SHUTIAN LIU.Optics communications. 2007, Vol 275, Num 2, pp 324-329, issn 0030-4018, 6 p.Article

Watermarks encrypted in the cascaded Fresnel digital hologramSHAOGENG DENG; LIREN LIU; HAITAO LANG et al.Optik (Stuttgart). 2007, Vol 118, Num 6, pp 302-305, issn 0030-4026, 4 p.Article

Attribute-Based Traitor TracingWANG, Yong-Tao; CHEN, Ke-Fei; CHEN, Jian-Hong et al.Journal of information science and engineering. 2011, Vol 27, Num 1, pp 181-195, issn 1016-2364, 15 p.Article

A new generalized group-oriented cryptoscheme without trusted centersCHIN-CHEN CHANG; HORNG-CHIN LEE.IEEE journal on selected areas in communications. 1993, Vol 11, Num 5, pp 725-729, issn 0733-8716Article

A new public key cryptosystem for constrained hardwareZHENG, Jiande.Lecture notes in computer science. 2002, pp 334-341, issn 0302-9743, isbn 3-540-44270-7, 8 p.Conference Paper

Amplified boomerang attacks against reduced-round MARS and SerpentKELSEY, John; KOHNO, Tadayoshi; SCHNEIER, Bruce et al.Lecture notes in computer science. 2001, pp 75-93, issn 0302-9743, isbn 3-540-41728-1Conference Paper

Non-malleable encryption : Equivalence between two notions, and an indistinguishability-based characterizationBELLARE, M; SAHAI, A.Lecture notes in computer science. 1999, pp 519-536, issn 0302-9743, isbn 3-540-66347-9Conference Paper

Efficient, verifiable shuffle decryption and its requirement of unlinkabilityJUN FURUKAWA.Lecture notes in computer science. 2004, pp 319-332, issn 0302-9743, isbn 3-540-21018-0, 14 p.Conference Paper

A key recovery mechanism for reliable group key managementCHO, Taenam; LEE, Sang-Ho.Lecture notes in computer science. 2003, pp 372-386, issn 0302-9743, isbn 3-540-20208-0, 15 p.Conference Paper

Fast RSA-type cryptosystem modulo pkqTAKAGI, T.Lecture notes in computer science. 1998, pp 318-326, issn 0302-9743, isbn 3-540-64892-5Conference Paper

Les secrets de César et du téléphone rougeLEHNING, Hervé.Recherche (Paris, 1970). 2005, Num 392, pp 80-81, issn 0029-5671, 2 p.Article

A key encapsulation mechanism for NTRUSTAM, Martijn.Lecture notes in computer science. 2005, pp 410-427, issn 0302-9743, isbn 3-540-30276-X, 1Vol, 18 p.Conference Paper

Practical key recovery schemesYEN, Sung-Ming.Lecture notes in computer science. 2001, pp 104-114, issn 0302-9743, isbn 3-540-42300-1Conference Paper

A chosen-plaintext linear attack on DESKNUDSEN, Lars R; MATHIASSEN, John Erik.Lecture notes in computer science. 2001, pp 262-272, issn 0302-9743, isbn 3-540-41728-1Conference Paper

Open issues in formal methods for cryptographic protocol analysisMEADOWS, Catherine.Lecture notes in computer science. 2001, issn 0302-9743, isbn 3-540-42103-3, p. 21Conference Paper

Long-lived broadcast encryptionGARAY, J. A; STADDON, J; WOOL, A et al.Lecture notes in computer science. 2000, pp 333-352, issn 0302-9743, isbn 3-540-67907-3Conference Paper

Reversible AMBTC-based secret sharing scheme with abilities of two decryptionsDUANHAO OU; WEI SUN.Journal of visual communication and image representation (Print). 2014, Vol 25, Num 5, pp 1222-1239, issn 1047-3203, 18 p.Article

Threshold Cryptography Based on Asmuth-Bloom Secret SharingKAYA, Kamer; SELQUK, Ali Aydin; TEZCAN, Zahir et al.Lecture notes in computer science. 2006, pp 935-942, issn 0302-9743, isbn 3-540-47242-8, 1Vol, 8 p.Conference Paper

Efficient cryptographic hardware using the co-design methodologyDE MACEDO MOURELLE, Luiza; NEDJAH, Nadia.International conference on information technology. 2004, pp vol2.508-512, isbn 0-7695-2108-8, 2VolConference Paper

Non-cryptographic primitive for pseudorandom permutationIWATA, Tetsu; YOSHINO, Tomonobu; KUROSAWA, Kaoru et al.Theoretical computer science. 2003, Vol 306, Num 1-3, pp 139-154, issn 0304-3975, 16 p.Article

A fundamental framework for network securitySCHUMACHER, H. J; GHOSH, S.Journal of network and computer applications. 1997, Vol 20, Num 3, pp 305-322, issn 1084-8045Article

Encryption board for IUT-T standard audiovisual servicesMATSUMOTO, H; OYAIZU, I.NTT review. 1994, Vol 6, Num 2, pp 32-38, issn 0915-2334Article

  • Page / 18