Search
Selected: R

RAmM Algorithm(Simplex)

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Randomness Efficient Steganography

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Randomness Quality of CI Chaotic Generators: Applications to Internet Security

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Rational Secret Sharing over an Asynchronous Broadcast Channel with Information Theoretic Security

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Re-visiting the One-Time Pad

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Reconciliation of a Quantum-Distributed Gaussian Key

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Recover plaintext attack to block ciphers

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Recursive double-size fixed precision arithmetic

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Recursive Information Hiding in Visual Cryptography

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Recursive Random Number Generator Using Prime Reciprocals

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Recursive Secret Sharing for Distributed Storage and Information Hiding

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Redesigning the Open Mobile Alliance License Choice Algorithm

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Reducing the Computation of Linear Complexities of Periodic Sequences over $GF(p^m)$

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

REESSE1+ . Reward . Proof by Experiment on 80-bit Moduli

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Refinement of Strategy and Technology Domains STOPE View on ISO 27001

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Reflection Scan: an Off-Path Attack on TCP

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Refuting the Pseudo Attack on the REESSE1+ Cryptosystem

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Reidentification and k-anonymity: a model for disclosure risk in graphs

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.