Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Quasigroups and their applications in cryptography
Full article: Quasigroups and their applications in cryptography Skip to Main Content Taylor and
Francis Online homepage Browse Search Publish Login | Register Log in or Register Login …
Francis Online homepage Browse Search Publish Login | Register Log in or Register Login …
[หนังสือ][B] Elements of quasigroup theory and applications
V Shcherbacov - 2017 - taylorfrancis.com
Understanding Interaction is a book that explores the interaction between people and
technology, in the broader context of the relations between the human made and the natural …
technology, in the broader context of the relations between the human made and the natural …
[PDF][PDF] Quasigroups in cryptology
S Victor - Computer Science Journal of Moldova, 2009 - ibn.idsi.md
Now the theory of quasigroups applications in cryptology goes through the period of rapid
enough growth. Therefore any review of results in the given area of researches quite quickly …
enough growth. Therefore any review of results in the given area of researches quite quickly …
Predictive intelligence in evaluation of visual perception thresholds for visual pattern recognition and understanding
This paper will present how predictive evaluation can be applied in research on specifying
perception thresholds in cognitive approach to understanding images. This approach will be …
perception thresholds in cognitive approach to understanding images. This approach will be …
Design of crypto primitives based on quasigroups
S Markovski - Quasigroups and Related Systems, 2015 - ibn.idsi.md
Today, the security of the modern world is undoubtedly dependent on the cryptographic
primitives built into the various protocols used for secure communication. Let us mention …
primitives built into the various protocols used for secure communication. Let us mention …
Detection and diagnosis of plant-wide oscillations using GA based factorization
S El-Ferik, MN Shareef, L Ettaleb - Journal of Process Control, 2012 - Elsevier
The degradation in the performance of the plant is observed in form of oscillations in time
trends of measurements. These disturbances propagate throughout the plant and also affect …
trends of measurements. These disturbances propagate throughout the plant and also affect …
A cryptographic algorithm based on hybrid cubes
Cryptographic algorithms are important to ensure the security of data during transmission or
storage. Many algorithms have been proposed based on various transformation and …
storage. Many algorithms have been proposed based on various transformation and …
Design of hash algorithm using Latin square
In this paper, we have proposed a new and an efficient cryptographic hash function based
on random Latin squares generated through padding, shift operations and non-linear …
on random Latin squares generated through padding, shift operations and non-linear …
[PDF][PDF] Cryptographic primitives with quasigroup transformations
A Mileva - Mathematica Balkanica, 2010 - core.ac.uk
This thesis is the final result of three years of research done in the Institute of Informatics at”
Ss Cyril and Methodius” University in Republic of Macedonia. First of all, I would like to thank …
Ss Cyril and Methodius” University in Republic of Macedonia. First of all, I would like to thank …
Intelligent and semantic threshold schemes for security in cloud computing
This article presents new methods of securing data with particular emphasis on their
applications in Cloud Computing. Methods of hiding data dedicated to processes of its …
applications in Cloud Computing. Methods of hiding data dedicated to processes of its …