Výsledky vyhľadávania - "Symmetric encryption algorithm"
-
1
Zdroj: NaUKMA Research Papers. Computer Science; Vol. 7 (2024): NaUKMA Research Papers. Computer Science; 89-97
Наукові записки НаУКМА. Комп'ютерні науки; Том 7 (2024): Наукові записки НаУКМА. Комп’ютерні науки; 89-97Predmety: Functional Encryption (FE), Internet of Things, архітектура IoT, TLS протокол, IoT architecture, Novel Tiny Symmetric Encryption Algorithm, центр довіри, TLS protocol, протокол, Інтернет речей, вразливості безпеки, DTLS, Lightweight CA Cipher (LCC) та Functional Encryption (FE), Lightweight CA Cipher (LCC), protocol, security vulnerabilities, trust center
Popis súboru: application/pdf
Prístupová URL adresa: http://nrpcomp.ukma.edu.ua/article/view/329686
-
2
Autori: a ďalší
Predmety: Algebraic analysis, Exponentiation modulo, Galois field, Nonpositional polynomial notations, S-block, Strict avalanche criterion, Symmetric encryption algorithm
Relation: https://zenodo.org/records/14869136; oai:zenodo.org:14869136
-
3
Autori:
Zdroj: NaUKMA Research Papers. Computer Science; Vol. 7 (2024): NaUKMA Research Papers. Computer Science; 89-97 ; Наукові записки НаУКМА. Комп'ютерні науки; Том 7 (2024): Наукові записки НаУКМА. Комп’ютерні науки; 89-97 ; 2617-7323 ; 2617-3808
Predmety: Internet of Things, security vulnerabilities, IoT architecture, trust center, TLS protocol, DTLS, protocol, Novel Tiny Symmetric Encryption Algorithm, Lightweight CA Cipher (LCC), Functional Encryption (FE), Інтернет речей, вразливості безпеки, архітектура IoT, центр довіри, TLS протокол, протокол, Lightweight CA Cipher (LCC) та Functional Encryption (FE)
Popis súboru: application/pdf
Relation: http://nrpcomp.ukma.edu.ua/article/view/329686/319209; http://nrpcomp.ukma.edu.ua/article/view/329686
-
4
Autori: Aru, Okereke Eze
Zdroj: LAUTECH Journal of Engineering and Technology; Vol. 18 No. 1 (2024): Vol. 18 No. 1; 87-97 ; 2672-5940 ; 1597-0000
Predmety: Encryption, Double exclusive OR, Internet, Triple data encryption algorithm, Symmetric encryption algorithm
Popis súboru: application/pdf
-
5
Autori:
Zdroj: Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, Vol 10, Iss 1 (2020)
Predmety: Environmental sciences, symmetric encryption algorithm, 0202 electrical engineering, electronic engineering, information engineering, block cipher, Environmental engineering, GE1-350, 0102 computer and information sciences, 02 engineering and technology, reversible cellular automata, TA170-171, 01 natural sciences
-
6
Autori:
Zdroj: Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska; Vol. 10 No. 1 (2020); 8-11 ; Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska; Tom 10 Nr 1 (2020); 8-11 ; 2391-6761 ; 2083-0157
Predmety: block cipher, symmetric encryption algorithm, reversible cellular automata, szyfr bloku, algorytm szyfrowania symetrycznego, odwracalny automat komórkowy
Popis súboru: application/pdf
-
7
-
8
Autori:
Zdroj: Gong-kuang zidonghua, Vol 38, Iss 7, Pp 7-10 (2012)
Predmety: coal mine, gas monitoring, data protection, data encryption, symmetric encryption algorithm, sql server 2008, Mining engineering. Metallurgy, TN1-997
Popis súboru: electronic resource
Prístupová URL adresa: https://doaj.org/article/8909b47030e245cfb72897e330bf5d89
-
9
Autori:
Zdroj: Symmetry
Volume 11
Issue 12Predmety: Arnold permutation, symmetric encryption algorithm, watermarking embedding, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, compression method, 0101 mathematics, digital watermarking image, wavelet transform, 01 natural sciences
Popis súboru: application/pdf
-
10
Autori: Johansson, Thomas
Predmety: Electrical Engineering, Electronic Engineering, Information Engineering, algebraic attacks, S-boxes, correlation attacks, time-memory tradeoff attacks, cryptanalysis, block cipher, modern stream ciphers, symmetric encryption algorithm
Relation: https://lup.lub.lu.se/record/612806
Dostupnosť: https://lup.lub.lu.se/record/612806
-
11
Autori:
Zdroj: Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska.
Predmety: block cipher, symmetric encryption algorithm, reversible cellular automata, szyfr bloku, algorytm szyfrowania symetrycznego, odwracalny automat komórkowy
-
12
Autori:
Prispievatelia:
-
13
Autori:
Zdroj: Приоритеты мировой науки: эксперимент и научная дискуссия: Материалы VIII Международной научной конференции. Северный Чарльстон, Южная Каролина, США, 17-18 июня 2015 г. Часть 1. Естественные и технические науки
-
14
Zdroj: NaUKMA Research Papers. Computer Science; Vol. 7 (2024): NaUKMA Research Papers. Computer Science; 89-97; 89-97; 2617-7323; 2617-3808
Témy: Internet of Things, security vulnerabilities, IoT architecture, trust center, TLS protocol, DTLS, protocol, Novel Tiny Symmetric Encryption Algorithm, Lightweight CA Cipher (LCC), Functional Encryption (FE), info:eu-repo/semantics/article, info:eu-repo/semantics/publishedVersion
-
15
Témy: Novel Tiny Symmetric Encryption Algorithm, DTLS, Lightweight CA Cipher (LCC), Functional Encryption (FE), Internet of Things, security vulnerabilities, IoT architecture, trust center, TLS protocol, protocol, Lightweight CA Cipher (LCC), Functional Encryption (FE), Article
-
16
Témy: Novel Tiny Symmetric Encryption Algorithm, DTLS, Lightweight CA Cipher (LCC), Functional Encryption (FE), Internet of Things, security vulnerabilities, IoT architecture, trust center, TLS protocol, protocol, Lightweight CA Cipher (LCC), Functional Encryption (FE), Article
-
17
Témy: Novel Tiny Symmetric Encryption Algorithm, DTLS, Lightweight CA Cipher (LCC), Functional Encryption (FE), Internet of Things, security vulnerabilities, IoT architecture, trust center, TLS protocol, protocol, Lightweight CA Cipher (LCC), Functional Encryption (FE), Article
-
18
Témy: Novel Tiny Symmetric Encryption Algorithm, DTLS, Lightweight CA Cipher (LCC), Functional Encryption (FE), Internet of Things, security vulnerabilities, IoT architecture, trust center, TLS protocol, protocol, Lightweight CA Cipher (LCC), Functional Encryption (FE), Article
Nájsť tento článok vo Web of Science
Full Text Finder