Search Results - random linear code encryption
-
1
Authors:
Source: 网络与信息安全学报, Vol 6, Iss 5, Pp 110-118 (2020)
Subject Terms: polar code, random linear code encryption, message padding, adaptively chosen ciphertext attacks, structural attacks, Electronic computers. Computer science, QA75.5-76.95
File Description: electronic resource
-
2
Authors:
Source: Вісник Національного технічного університету "ХПÌ": Системний аналіз, управління та інформаційні технології, Iss 1 (13), Pp 112-116 (2025)
Subject Terms: cascade transmission model, vpn encryption, hamming codes, forward error correction, data integrity, communication security, parity bit, noise resilience, network attacks, information reliability, Technology
File Description: electronic resource
-
3
Authors:
Source: 网络与信息安全学报, Vol 6, Pp 110-118 (2020)
-
4
Authors: et al.
Source: IEEE Transactions on Information Theory. May2018, Vol. 64 Issue 5, p3927-3943. 17p.
Subject Terms: *DATA encryption, *CYCLIC codes, *PUBLIC key cryptography, *DECODERS & decoding, *PROBABILITY theory
-
5
Authors:
Source: Physical Communication. Mar2014, Vol. 10, p24-30. 7p.
-
6
Authors:
Source: IET Communications (Wiley-Blackwell). Jun2017, Vol. 11 Issue 9, p1195-1198. 4p.
Subject Terms: *LINEAR codes, *TELECOMMUNICATION security, *CRYPTOSYSTEMS, *CRYPTOGRAPHY
-
7
Authors: et al.
Source: Scientific Reports, Vol 15, Iss 1, Pp 1-27 (2025)
Subject Terms: S-Box, Non-linearity, Chaotic map, Random numbers, Wireless communication security, Smart cities, Medicine, Science
File Description: electronic resource
Relation: https://doaj.org/toc/2045-2322
-
8
Authors:
Source: Cryptologia; Jul2024, Vol. 48 Issue 4, p323-351, 29p
Subject Terms: CRYPTOGRAPHY, CRYPTOSYSTEMS, LINEAR codes, PUBLIC key cryptography, DECODING algorithms
-
9
Authors:
Source: ETRI Journal. 2010, Vol. 32 Issue 1, p93-101. 9p. 2 Diagrams, 1 Chart, 3 Graphs.
-
10
Authors: REGEV, ODED
Source: Journal of the ACM; Sep2009, Vol. 56 Issue 6, p34-34:40, 40p, 1 Diagram, 4 Graphs
Subject Terms: LATTICE theory, ERRORS, CRYPTOGRAPHY, PUBLIC key cryptography, ALGORITHMS, MATHEMATICAL models
-
11
Authors:
Source: Finite Fields & Their Applications. Jan2021, Vol. 69, pN.PAG-N.PAG. 1p.
Subject Terms: *LINEAR codes, *PARAMETERIZATION
-
12
Authors:
Source: IET Communications (Wiley-Blackwell). Jul2018, Vol. 12 Issue 11, p1491-1497. 7p.
Subject Terms: *ADVANCED Encryption Standard, *TELECOMMUNICATION security, *TIME complexity, *CHANNEL coding, RELIABILITY of telecommunication
Company/Entity: NATIONAL Institute of Standards & Technology (U.S.)
-
13
Authors: et al.
Source: Scientific reports [Sci Rep] 2025 Jul 28; Vol. 15 (1), pp. 27426. Date of Electronic Publication: 2025 Jul 28.
Publication Type: Journal Article
Journal Info: Publisher: Nature Publishing Group Country of Publication: England NLM ID: 101563288 Publication Model: Electronic Cited Medium: Internet ISSN: 2045-2322 (Electronic) Linking ISSN: 20452322 NLM ISO Abbreviation: Sci Rep Subsets: PubMed not MEDLINE; MEDLINE
-
14
Authors: et al.
Source: Scientific reports [Sci Rep] 2025 May 14; Vol. 15 (1), pp. 16729. Date of Electronic Publication: 2025 May 14.
Publication Type: Journal Article
Journal Info: Publisher: Nature Publishing Group Country of Publication: England NLM ID: 101563288 Publication Model: Electronic Cited Medium: Internet ISSN: 2045-2322 (Electronic) Linking ISSN: 20452322 NLM ISO Abbreviation: Sci Rep Subsets: PubMed not MEDLINE; MEDLINE
-
15
Authors:
Source: Journal of Mathematical Cryptology, Vol 18, Iss 1, Pp 2350051-715 (2024)
Subject Terms: pseudo-random objects, finite field, linear algebra, mixing rate, entropy, total variation distance, 94a60, 37a25, Mathematics, QA1-939
File Description: electronic resource
Relation: https://doaj.org/toc/1862-2984
-
16
-
17
Authors:
Source: Advances in Cryptology - CRYPTO 2007; 2007, p92-110, 19p
-
18
Authors:
Source: Applied Soft Computing. May2012, Vol. 12 Issue 5, p1457-1466. 10p.
-
19
Authors:
Contributors:
-
20
Authors: Guangjun Liu1
Source: KSII Transactions on Internet & Information Systems. Mar2015, Vol. 9 Issue 3, p1193-1209. 17p. 2 Diagrams, 1 Chart.
Subject Terms: Linear network coding, Eavesdropping, Cryptography, Data security, Vandermonde matrices
Nájsť tento článok vo Web of Science
Full Text Finder