Public-key cryptography

A Salomaa - 2013‏ - books.google.com
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal
discovery in 1977 of public-key cryptography and applications in computers and …

[كتاب][B] Additive Cellular Automata: Theory and Applications, Volume 1

PP Chaudhuri, DR Chowdhury, S Nandi… - 1997‏ - books.google.com
This book presents an extensive survey and report of related research on important
developments in cellular automata (CA) theory. The authors introduce you to this theory in a …

Theory and applications of cellular automata in cryptography

S Nandi, BK Kar, PP Chaudhuri - IEEE Transactions on …, 1994‏ - ieeexplore.ieee.org
This paper deals with the theory and application of Cellular Automata (CA) for a class of
block ciphers and stream ciphers. Based on CA state transitions certain fundamental …

Image feature extraction in encrypted domain with privacy-preserving SIFT

CY Hsu, CS Lu, SC Pei - IEEE transactions on image …, 2012‏ - ieeexplore.ieee.org
Privacy has received considerable attention but is still largely ignored in the multimedia
community. Consider a cloud computing scenario where the server is resource-abundant …

[كتاب][B] Parallel computation: models and methods

SG Akl - 1997‏ - dl.acm.org
Parallel computation | Guide books skip to main content ACM Digital Library home ACM home
Google, Inc. (search) Advanced Search Browse About Sign in Register Advanced Search …

[كتاب][B] Applied abstract algebra

R Lidl, G Pilz - 2012‏ - books.google.com
There is at present a growing body of opinion that in the decades ahead discrete
mathematics (that is," noncontinuous mathematics"), and therefore parts of applicable …

[كتاب][B] Elements of modern algebra

J Gilbert, L Gilbert - 1988‏ - academia.edu
This Elements of Modern Algebra book is not really ordinary book, you have it then the world
is in your hands. The benefit you get by reading this book is actually information inside this …

[كتاب][B] Kryptologie

A Beutelspacher - 1996‏ - Springer
Aut prodesse volunt aut delectare poetae aut simul et iucunda et idonea dicere
vitae.(Nützen oder erfreuen wollen die Dichter, oder, was zugleich erfreulich und nützlich …

[كتاب][B] Advanced optical and wireless communications systems

IB Djordjevic - 2018‏ - Springer
The purpose of this book is to introduce the reader to most advanced topics of (i) wireless
communications,(ii) free-space optical (FSO) communications,(iii) indoor optical wireless …

[PDF][PDF] Cryptographic hash functions: A survey

S Bakhtiari, R Safavi-Naini, J Pieprzyk - 1995‏ - Citeseer
This paper gives a survey on cryptographic hash functions. It gives an overview of all types
of hash functions and reviews design principals and possible methods of attacks. It also …