نتایج جستجو برای: cryptography

تعداد نتایج: 38324  

Journal: :international journal of group theory 2015
ted hurley

this is a survey of some recent applications of abstract algebra, and in particular group rings, to the `communications' areas.

Journal: :journal of artificial intelligence in electrical engineering 2013
farhad narimani mohammad esmaeel akbari hamid vahdati

in this paper, a faster method for embedding cryptographic information in the image ispresented by expressing the concept of latent prints (steganography). data is encrypted bytwo methods before embedding to increase reliability. then they are embedded into the imageby a button, a method has been expressed to reduce potential noise impact on the wayinformation is encoded.

Cheraghi Cheraghi, Massoud Hadian Dehkordi,

Given a graph G, a visual cryptography scheme based on the graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper we apply maximal independent sets of the grap...

In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind  digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...

Journal: :Contemporary Physics 1995

Journal: :Communications of The ACM 2021

Synthesizing the emerging directions of research at intersection differential privacy and cryptography.

Journal: :Lecture Notes in Computer Science 2022

Abstract In our modern digital society, cryptography is vital to protect the secrecy and integrity of transmitted stored information. Settings like commerce, electronic banking, or simply private email communication already rely on encryption signature schemes. However, today’s cryptographic schemes do not scale well, thus are suited for increasingly large sets data they used on. For instance, ...

Journal: :International Journal of Pure and Apllied Mathematics 2013

Journal: :Journal of the ACM 2017

Journal: :International Journal of Computer Applications 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید