-
1
المؤلفون: Reham Almukhlifi, Poorvi L. Vora
المصدر: Cryptography
Volume 7
Issue 1
Pages: 8مصطلحات موضوعية: Computational Theory and Mathematics, Computer Networks and Communications, Applied Mathematics, super round, linear cryptanalysis,
Simeck<%2Fspan>%22">Simeck, Software, Computer Science Applications وصف الملف: application/pdf
-
2
المؤلفون: Yuansong Qiao, Brian Lee, Mehwish Tahir, Mamoona Asghar, Nadia Kanwal
المساهمون: Technological University of the Shannon: Midlands Midwest
المصدر: Cryptography
Volume 7
Issue 1
Pages: 7مصطلحات موضوعية: cryptography, smart cities, Computer Networks and Communications, Video summarization, Applied Mathematics, Classification, Computer Science Applications, video summarization, TUS MIdlands [Software Research Institute], Computational Theory and Mathematics, classification, traffic events, Cryptography, YOLO, Traffic events, Software, Smart cities
وصف الملف: application/pdf; PDF
-
3
المؤلفون: Je-Kuan Lin, Wun-Ting Lin, Ja-Ling Wu
المصدر: Cryptography; Volume 7; Issue 2; Pages: 28
مصطلحات موضوعية: Computational Theory and Mathematics, Computer Networks and Communications, Applied Mathematics, attribute-based encryption, searchable encryption, index table, fuzzy search, semantic search, data retrieval, Software, Computer Science Applications
وصف الملف: application/pdf
-
4
المؤلفون: Bruno Miguel Batista Pereira, José Manuel Torres, Pedro Miguel Sobral, Rui Silva Moreira, Christophe Pinto de Almeida Soares, Ivo Pereira
المصدر: Cryptography; Volume 7; Issue 2; Pages: 27
مصطلحات موضوعية: blockchain, voting, genetic algorithm, electronic voting, Computational Theory and Mathematics, Computer Networks and Communications, Applied Mathematics, Software, Computer Science Applications
وصف الملف: application/pdf
-
5
المؤلفون: Luis Parrilla, Antonio García, Encarnación Castillo, Juan Antonio López-Villanueva, Uwe Meyer-Baese
المصدر: Cryptography; Volume 7; Issue 2; Pages: 26
مصطلحات موضوعية: Computational Theory and Mathematics, Computer Networks and Communications, Applied Mathematics, Software, random numbers, hardware TRNGs, FPGAs, ring oscillators, Computer Science Applications
وصف الملف: application/pdf
-
6
المصدر: Cryptography; Volume 7; Issue 2; Pages: 23
مصطلحات موضوعية: Computational Theory and Mathematics, Computer Networks and Communications, Applied Mathematics, cloud computing, image, neural key exchange protocol, LDPC coding, cryptcoding, subkey, Khazad function, security, reliability, Software, Computer Science Applications
وصف الملف: application/pdf
-
7
المؤلفون: Michael Clear, Hitesh Tewari
المصدر: Cryptography; Volume 7; Issue 2; Pages: 22
مصطلحات موضوعية: Computational Theory and Mathematics, Computer Networks and Communications, Applied Mathematics, identity-based encryption, homomorphic encryption, anonymous aggregation, Software, Computer Science Applications
وصف الملف: application/pdf
-
8
المؤلفون: Mua’ad Abu-Faraj, Abeer Al-Hyari, Charlie Obimbo, Khaled Aldebei, Ismail Altaharwa, Ziad Alqadi, Orabe Almanaseer
المصدر: Cryptography; Volume 7; Issue 2; Pages: 20
مصطلحات موضوعية: Computational Theory and Mathematics, Computer Networks and Communications, Applied Mathematics, cryptography, private key, chaotic logistic map, chaotic logistic map key, chaotic parameter, MSE, PSNR, CC, throughput, Software, Computer Science Applications
وصف الملف: application/pdf
-
9
المؤلفون: Pavol Zajac
المصدر: Cryptography; Volume 7; Issue 2; Pages: 19
مصطلحات موضوعية: Computational Theory and Mathematics, Computer Networks and Communications, Applied Mathematics, MRHS equation, algebraic cryptanalysis, MRHS solver, Software, Computer Science Applications
وصف الملف: application/pdf
-
10
المصدر: Cryptography; Volume 7; Issue 2; Pages: 17
مصطلحات موضوعية: Computational Theory and Mathematics, Computer Networks and Communications, Applied Mathematics, spiking neural networks, side channel analysis, reverse engineering, Software, Computer Science Applications
وصف الملف: application/pdf