Yazar
Alginahi, Yasser M., ed.
Format:
Electronic Resources
Alıntı:
message authentication.
Yazar
Rhee, Man Young, author.
Abstract with links to resource http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5628362
Format:
Electronic Resources
Alıntı:
elliptic curve cryptosystems -- Hash function, message authentication code, and data expansion function.
View Other Search Results
Yazar
Moriai, Shiho. editor.
Format:
Electronic Resources
Alıntı:
Functions -- Message Authentication Codes -- Provable Security -- Implementation Aspects -- Lightweight
Yazar
Abdalla, Michel. editor.
Format:
Electronic Resources
Alıntı:
-- Secure computation - implementation -- Zero knowledge -- Message authentication -- Proofs of space and
Yazar
Adams, Carlisle. editor.
Format:
Electronic Resources
Alıntı:
Authentication Codes -- Authenticated Encryption -- Post-Quantum Cryptography -- Efficient Implementations
Yazar
Sako, Kazue. editor.
Format:
Electronic Resources
Alıntı:
signatures, lattice cryptography, cryptanalysis of symmetric key encryption, message authentication code and
Yazar
Zhang, Peng. author.
Format:
Electronic Resources
Alıntı:
mechanisms are MacSig, a new message authentication method for network-coded systems; P-Coding, a new
Yazar
Živić, Nataša. editor.
Format:
Electronic Resources
Alıntı:
Robust Image Authentication in the Presence of Noise Živić, Nataša. editor.
Yazar
Shikata, Junji. editor. (orcid)0000-0003-2861-359X
Format:
Electronic Resources
Alıntı:
extraction -- Key and message rates -- Secret sharing -- Authentication codes -- Multiparty computations
Yazar
Albrecht, Martin. editor.
Format:
Electronic Resources
Alıntı:
Data -- Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes -- SO-CCA Secure PKE in
Yazar
Escalona, María José. editor.
Format:
Electronic Resources
Alıntı:
Authentication based on Smart-devices -- An Open Source Approach for Modernizing Message-processing and
12.
Yazar
Baldi, Marco. editor. (orcid)0000-0002-8754-5526
Format:
Electronic Resources
Alıntı:
Play: Authenticating Mobile Users via Game Playing -- Fuzzy Authentication using Rank Distance -- A
Arama Sonuçlarını Sınırlandır