The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "Cryptogr."( http://dblp.L3S.de/Venues/Cryptogr. )

URL (DBLP): http://dblp.uni-trier.de/db/journals/cryptography

Publication years (Num. hits)
2017 (25) 2018 (41) 2019 (28) 2020 (37) 2021 (38) 2022 (65) 2023 (64) 2024 (11)
Publication types (Num. hits)
article(309)
Venues (Conferences, Journals, ...)
Cryptogr.(309)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 309 publication records. Showing 309 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Mitchell T. Martin, Jim Plusquellic NotchPUF: Printed Circuit Board PUF Based on Microstrip Notch Filter. Search on Bibsonomy Cryptogr. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Alexander Sauer, Gernot Alber Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming. Search on Bibsonomy Cryptogr. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Oleg Evsutin, Kristina Dzhanashia Algorithm of Information Embedding into Digital Images Based on the Chinese Remainder Theorem for Data Security. Search on Bibsonomy Cryptogr. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Md Jubayer al Mahmod, Ujjwal Guin A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications. Search on Bibsonomy Cryptogr. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mohammed Abu Taha, Wassim Hamidouche, Naty Sidaty, Marko Viitanen, Jarno Vanne, Safwan El Assad, Olivier Déforges Privacy Protection in Real Time HEVC Standard Using Chaotic System. Search on Bibsonomy Cryptogr. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Donghoe Heo, Suhri Kim, Kisoon Yoon, Young-Ho Park 0001, Seokhie Hong Optimized CSIDH Implementation Using a 2-Torsion Point. Search on Bibsonomy Cryptogr. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Takeshi Sugawara 0001 Hardware Performance Evaluation of Authenticated Encryption SAEAES with Threshold Implementation. Search on Bibsonomy Cryptogr. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Rinat Breuer, Itamar Levi How Bad Are Bad Templates? Optimistic Design-Stage Side-Channel Security Evaluation and its Cost. Search on Bibsonomy Cryptogr. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Noah Cowper, Harry C. Shaw, David R. Thayer Chaotic Quantum Key Distribution. Search on Bibsonomy Cryptogr. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Bertrand Cambou, Michael Gowanlock, Julie Heynssens, Saloni Jain, Christopher Robert Philabaum, Duane Booher, Ian Burke, Jack Garrard, Donald Telesca, Laurent Njilla Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions. Search on Bibsonomy Cryptogr. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yunhong Zhou, Shihui Zheng, Licheng Wang Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud. Search on Bibsonomy Cryptogr. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ashutosh Dhar Dwivedi Security Analysis of Lightweight IoT Cipher: Chaskey. Search on Bibsonomy Cryptogr. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ali Shuja Siddiqui, Yutian Gui, Fareena Saqib Secure Boot for Reconfigurable Architectures. Search on Bibsonomy Cryptogr. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Aysajan Abidin On Detecting Relay Attacks on RFID Systems Using Qubits. Search on Bibsonomy Cryptogr. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Georgia Tsaloli, Gustavo Banegas, Aikaterini Mitrokotsa Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing. Search on Bibsonomy Cryptogr. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Lukas Fladung, Georgios M. Nikolopoulos, Gernot Alber, Marc Fischlin Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sally Lin Pei Ching, Faridah Yunos Effect of Self-Invertible Matrix on Cipher Hexagraphic Polyfunction. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Syed Kamran Haider, Marten van Dijk Flat ORAM: A Simplified Write-Only Oblivious RAM Construction for Secure Processors. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ibou Sene, Abdoul Aziz Ciss, Oumar Niang I2PA: An Efficient ABC for IoT. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Matthew Campagna, Shay Gueron Key Management Systems at the Cloud Scale. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yasir Naseer, Tariq Shah, Dawood Shah, Sadam Hussain A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Muhammad Rezal Kamel Ariffin, Saidu Isah Abubakar, Faridah Yunos, Muhammad Asyraf Asbullah New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Niraj Kumar 0005 Practically Feasible Robust Quantum Money with Classical Verification. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mohamad Ali Mehrabi Improved Sum of Residues Modular Multiplication Algorithm. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Kai-Min Chung, Marios Georgiou 0001, Ching-Yi Lai, Vassilis Zikas Cryptography with Disposable Backdoors. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ashutosh Dhar Dwivedi, Shalini Dhar, Gautam Srivastava 0001, Rajani Singh Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Karuna Pande Joshi, Agniva Banerjee Automating Privacy Compliance Using Policy Integrated Blockchain. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Seyed Mojtaba Dehnavi Further Observations on SIMON and SPECK Block Cipher Families. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Amit Phadikar, Poulami Jana, Himadri S. Mandal Reversible Data Hiding for DICOM Image Using Lifting and Companding. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Luigi Accardi, Satoshi Iriyama, Koki Jimbo, Massimo Regoli A New Class of Strongly Asymmetric PKA Algorithms: SAA-5. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tariq Shah, Ayesha Qureshi S-Box on Subgroup of Galois Field. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Alzahraa J. Mohammed, Ali A. Yassin Efficient and Flexible Multi-Factor Authentication Protocol Based on Fuzzy Extractor of Administrator's Fingerprint and Smart Mobile Device. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1 Acknowledgement to Reviewers of Cryptography in 2018. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Le Van Luyen An Improved Identity-Based Multivariate Signature Scheme Based on Rainbow. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sitalakshmi Venkatraman, Anthony Overmars New Method of Prime Factorisation-Based Attacks on RSA Authentication in IoT. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ayoub Mars, Wael Adi New Family of Stream Ciphers as Physically Clone-Resistant VLSI-Structures. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Saleh Mulhem, Wael Adi New Mathblocks-Based Feistel-Like Ciphers for Creating Clone-Resistant FPGA Devices. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Maki Kihara, Satoshi Iriyama New Authentication Algorithm Based on Verifiable Encryption with Digital Identity. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Md Shahed Enamul Quadir, John A. Chandy Key Generation for Hardware Obfuscation Using Strong PUFs. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jeff Calhoun, Cyrus Minwalla, Charles Helmich, Fareena Saqib, Wenjie Che, Jim Plusquellic Physical Unclonable Function (PUF)-Based e-Cash Transaction Protocol (PUF-Cash). Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Asad Ali Siyal, Aisha Zahid Junejo, Muhammad Zawish, Kainat Ahmed, Aiman Khalil, Georgia Soursou Applications of Blockchain Technology in Medicine and Healthcare: Challenges and Future Perspectives. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Bhupendra Nath Tiwari, Jude Kibinde Kuipo, Joshua Muyiwa Adeegbe, Ninoslav Marina Optimized AKS Primality Testing: A Fluctuation Theory Perspective. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Brian Coyle, Elham Kashefi, Matty J. Hoban Certified Randomness From Steering Using Sequential Measurements. Search on Bibsonomy Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Pratha Anuradha Kameswari, Lambadi Jyotsna An Attack Bound for Small Multiplicative Inverse of φ(N) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Stefania Loredana Nita, Marius Iulian Mihailescu, Valentin Corneliu Pau Security and Cryptographic Challenges for Authentication Based on Biometrics Data. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yunxi Guo, Timothy Dee, Akhilesh Tyagi Barrel Shifter Physical Unclonable Function Based Encryption. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ying-Yu Chen, Bo-Yuan Huang 0002, Justie Su-tzu Juan A (k, n)-Threshold Progressive Visual Secret Sharing without Expansion. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bertrand Cambou, Paul G. Flikkema, James Palmer, Donald Telesca, Christopher Robert Philabaum Can Ternary Computing Improve Information Assurance? Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jim Plusquellic, Matthew Areno Correlation-Based Robust Authentication (Cobra) Using Helper Data Only. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Balaji Chandrasekaran, Ramadoss Balakrishnan An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Don Owen Jr., Derek Heeger, Calvin Chan, Wenjie Che, Fareena Saqib, Matthew Areno, Jim Plusquellic An Autonomous, Self-Authenticating, and Self-Contained Secure Boot Process for Field-Programmable Gate Arrays. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1James Jin Kang, Kiran Fahd, Sitalakshmi Venkatraman Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Andreas Vogt 0001 Special Issue on Cryptographic Protocols. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Edoardo Persichetti Efficient One-Time Signatures from Quasi-Cyclic Codes: A Full Treatment. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sadman Sakib, Preeti Kumari, Bashir M. Sabquat Bahar Talukder, Md. Tauhidur Rahman 0001, Biswajit Ray Non-Invasive Detection Method for Recycled Flash Memory Using Timing Characteristics †. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ted Krovetz The Definition and Software Performance of Hashstream, a Fast Length-Flexible PRF. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rami Sheikh, Rosario Cammarota Improving Performance and Mitigating Fault Attacks Using Value Prediction. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nikolaos Athanasios Anagnostopoulos, Tolga Arul, Yufan Fan, Christian Hatzfeld, André Schaller, Wenjie Xiong 0001, Manishkumar Jain, Muhammad Umair Saleem, Jan Lotichius, Sebastian Gabmeyer, Jakub Szefer, Stefan Katzenbeisser 0001 Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security †. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Md. Iftekhar Salam, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong Fault Attacks on the Authenticated Encryption Stream Cipher MORUS. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jani Suomalainen, Adrian Kotelba, Jari Kreku, Sami Lehtonen Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shoichi Hirose Sequential Hashing with Minimum Padding. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1William Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, Kris Gaj Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Filippo Gandino, Bartolomeo Montrucchio, Maurizio Rebaudengo Redundancy in Key Management for WSNs. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Aleksandr Ometov, Sergey Bezzateev, Niko Mäkitalo, Sergey Andreev 0001, Tommi Mikkonen, Yevgeni Koucheryavy Multi-Factor Authentication: A Survey. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ziyuan Hu, Shengli Liu 0001, Kefei Chen, Joseph K. Liu Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Salome James, N. B. Gayathri 0001, Punugu Vasudeva Reddy Pairing Free Identity-Based Blind Signature Scheme with Message Recovery. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Taimour Wehbe, Vincent John Mooney III, David C. Keezer Hardware-Based Run-Time Code Integrity in Embedded Devices. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jean-Luc Danger, Youssef El Housni, Adrien Facon, Cheikh Thiecoumba Gueye, Sylvain Guilley, Sylvie Herbel, Ousmane Ndiaye, Edoardo Persichetti, Alexander Schaub 0001 On the Performance and Security of Multiplication in GF(2N). Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Christian Frøystad, Inger Anne Tøndel, Martin Gilje Jaatun Security Incident Information Exchange for Cloud Service Provisioning Chains. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Michel A. Kinsy, Lake Bu, Mihailo Isakov, Miguel Mark Designing Secure Heterogeneous Multicore Systems from Untrusted Components. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alan T. Litchfield, Jeff Herbert ReSOLV: Applying Cryptocurrency Blockchain Methods to Enable Global Cross-Platform Software License Validation. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xavier Boyen, Thomas Haines Forward-Secure Linkable Ring Signatures from Bilinear Maps. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Juha Partala Provably Secure Covert Communication on Blockchain. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dimitrios Alvanos, Konstantinos Limniotis, Stavros Stavrou On the Cryptographic Features of a VoIP Service. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Filipe Casal, João Rasga, André Souto Kolmogorov One-Way Functions Revisited. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sebastian Baur, Holger Boche Robust Secure Authentication and Data Storage with Perfect Secrecy. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1María Isabel González Vasco, Angela Robinson, Rainer Steinwandt Cryptanalysis of a Proposal Based on the Discrete Logarithm Problem Inside Sn. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Terry Shue Chien Lau, Chik How Tan A New Technique in Rank Metric Code-Based Encryption. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sadiel de la Fe, Carles Ferrer 0001 A Secure Algorithm for Inversion Modulo 2k. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jonathan T. Trostle CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nikolaos Athanasios Anagnostopoulos, Stefan Katzenbeisser 0001, John A. Chandy, Fatemeh Tehranipoor An Overview of DRAM-Based Security Primitives. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jialuo Han, Jidong Wang An Enhanced Key Management Scheme for LoRaWAN. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Megha Agrawal, Donghoon Chang, Jinkeon Kang Deterministic Authenticated Encryption Scheme for Memory Constrained Devices. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Joy Jo-Yi Chang, Bo-Yuan Huang 0002, Justie Su-tzu Juan A New Visual Multi-Secrets Sharing Scheme by Random Grids. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wenjie Che, Mitchell T. Martin, Goutham Pocklassery, Venkata K. Kajuluri, Fareena Saqib, Jim Plusquellic A Privacy-Preserving, Mutual PUF-Based Authentication Protocol. Search on Bibsonomy Cryptogr. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Swapnoneel Roy, Chanchal Khatwani Cryptanalysis and Improvement of ECC Based Authentication and Key Exchanging Protocols. Search on Bibsonomy Cryptogr. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Diego Romano, Giovanni Schmid Beyond Bitcoin: A Critical Look at Blockchain-Based Systems. Search on Bibsonomy Cryptogr. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wenjie Che, Venkata K. Kajuluri, Fareena Saqib, Jim Plusquellic Leveraging Distributions in Physical Unclonable Functions. Search on Bibsonomy Cryptogr. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anton Pljonkin, Konstantin E. Rumyantsev, Pradeep Kumar Singh 0001 Synchronization in Quantum Key Distribution Systems. Search on Bibsonomy Cryptogr. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Leyla Isik, Arne Winterhof Maximum-Order Complexity and Correlation Measures. Search on Bibsonomy Cryptogr. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wenjie Che, Venkata K. Kajuluri, Mitchell T. Martin, Fareena Saqib, Jim Plusquellic Analysis of Entropy in a Hardware-Embedded Delay PUF. Search on Bibsonomy Cryptogr. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daniel G. Costa, José Solenir Lima Figuerêdo, Gledson Oliveira Cryptography in Wireless Multimedia Sensor Networks: A Survey and Research Directions. Search on Bibsonomy Cryptogr. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hae-Duck J. Jeong, WonHwi Ahn, Hyeonggeun Kim, Jong-Suk Ruth Lee Anomalous Traffic Detection and Self-Similarity Analysis in the Environment of ATMSim. Search on Bibsonomy Cryptogr. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chenglu Jin, Charles Herder, Ling Ren 0001, Phuong Ha Nguyen, Benjamin Fuller 0001, Srinivas Devadas, Marten van Dijk FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise. Search on Bibsonomy Cryptogr. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Florentin Thullier, Bruno Bouchard 0001, Bob-Antoine Jerry Ménélas A Text-Independent Speaker Authentication System for Mobile Devices. Search on Bibsonomy Cryptogr. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jamie Sikora Simple, Near-Optimal Quantum Protocols for Die-Rolling. Search on Bibsonomy Cryptogr. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sarah Louise Renwick, Keith M. Martin Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment. Search on Bibsonomy Cryptogr. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1George Hatzivasilis Password-Hashing Status. Search on Bibsonomy Cryptogr. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shoni Gilboa, Shay Gueron, Mridul Nandi Balanced Permutations Even-Mansour Ciphers. Search on Bibsonomy Cryptogr. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Elham Kashefi, Petros Wallden Garbled Quantum Computation. Search on Bibsonomy Cryptogr. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 309 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license