Quasigroups and their applications in cryptography

D Chauhan, I Gupta, R Verma - Cryptologia, 2021 - Taylor & Francis
Full article: Quasigroups and their applications in cryptography Skip to Main Content Taylor and
Francis Online homepage Browse Search Publish Login | Register Log in or Register Login …

[หนังสือ][B] Elements of quasigroup theory and applications

V Shcherbacov - 2017 - taylorfrancis.com
Understanding Interaction is a book that explores the interaction between people and
technology, in the broader context of the relations between the human made and the natural …

[PDF][PDF] Quasigroups in cryptology

S Victor - Computer Science Journal of Moldova, 2009 - ibn.idsi.md
Now the theory of quasigroups applications in cryptology goes through the period of rapid
enough growth. Therefore any review of results in the given area of researches quite quickly …

Predictive intelligence in evaluation of visual perception thresholds for visual pattern recognition and understanding

U Ogiela, V Snášel - Information Processing & Management, 2022 - Elsevier
This paper will present how predictive evaluation can be applied in research on specifying
perception thresholds in cognitive approach to understanding images. This approach will be …

Design of crypto primitives based on quasigroups

S Markovski - Quasigroups and Related Systems, 2015 - ibn.idsi.md
Today, the security of the modern world is undoubtedly dependent on the cryptographic
primitives built into the various protocols used for secure communication. Let us mention …

Detection and diagnosis of plant-wide oscillations using GA based factorization

S El-Ferik, MN Shareef, L Ettaleb - Journal of Process Control, 2012 - Elsevier
The degradation in the performance of the plant is observed in form of oscillations in time
trends of measurements. These disturbances propagate throughout the plant and also affect …

A cryptographic algorithm based on hybrid cubes

S Jamel, T Herawan, MM Deris - International Conference on …, 2010 - Springer
Cryptographic algorithms are important to ensure the security of data during transmission or
storage. Many algorithms have been proposed based on various transformation and …

Design of hash algorithm using Latin square

R Ghosh, S Verma, R Kumar, S Kumar… - Procedia Computer …, 2015 - Elsevier
In this paper, we have proposed a new and an efficient cryptographic hash function based
on random Latin squares generated through padding, shift operations and non-linear …

[PDF][PDF] Cryptographic primitives with quasigroup transformations

A Mileva - Mathematica Balkanica, 2010 - core.ac.uk
This thesis is the final result of three years of research done in the Institute of Informatics at”
Ss Cyril and Methodius” University in Republic of Macedonia. First of all, I would like to thank …

Intelligent and semantic threshold schemes for security in cloud computing

L Ogiela, V Snášel - Concurrency and Computation: Practice …, 2021 - Wiley Online Library
This article presents new methods of securing data with particular emphasis on their
applications in Cloud Computing. Methods of hiding data dedicated to processes of its …