Search
Selected: C

Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of an Elliptic Curve-based Signcryption Scheme

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of an Encryption Scheme Based on Blind Source Separation

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of an Image Encryption Scheme Based on a Compound Chaotic Sequence

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of an image encryption scheme based on the Hill cipher

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables

Computer Science – Multimedia
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of group-based key agreement protocols using subgroup distance functions

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of HFE

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of SDES via evolutionary computation techniques

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of Song's advanced smart card based password authentication protocol

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of the CFVZ cryptosystem

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of the RSA-CEGD protocol

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of Two McEliece Cryptosystems Based on Quasi-Cyclic Codes

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of two mutual authentication protocols for low-cost RFID

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalyzing a chaos-based image encryption algorithm using alternate structure

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptoendolith Communities in Antarctic Dry Valley Region Sandstones: Potential Analogues of Martian Life-Forms

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptographic Authentication of Navigation Protocols

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.