Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
54 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: E.3 - DATA ENCRYPTION
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
The Use of Runtime Reconfiguration on FPGA Circuits to Increase the Performance of the AES Algorithm Implementation
Oscar Pérez
,
Yves Berviller
,
Camel Tanougast
,
Serge Weber
10.3217/jucs-013-03-0349
28-03-2007
Unique: 327 | Total: 380
| Access Period:
349-362
HTML
XML
PDF
Research Article
The Number of the Modulo n Roots of the Polynomial xv — xv and the RSA
János Gonda
10.3217/jucs-012-09-1215
28-09-2006
Unique: 309 | Total: 369
| Access Period:
1215-1228
HTML
XML
PDF
Research Article
Progress in Quantum Computational Cryptography
Akinori Kawachi
,
Takeshi Koshiba
10.3217/jucs-012-06-0691
28-06-2006
Unique: 361 | Total: 417
| Access Period:
691-709
HTML
XML
PDF
Research Article
Randomness and Secrecy - A Brief Introduction
Johannes Blõmer
10.3217/jucs-012-06-0654
28-06-2006
Unique: 389 | Total: 474
| Access Period:
654-671
HTML
XML
PDF
Research Article
Pareto-Optimal Hardware for Substitution Boxes
Nadia Nedjah
,
Luiza Mourelle
10.3217/jucs-012-04-0395
28-04-2006
Unique: 365 | Total: 409
| Access Period:
395-407
HTML
XML
PDF
Research Article
Domain Extenders for UOWHF: A Finite Binary Tree Algorithm
Palash Sarkar
10.3217/jucs-011-06-1040
28-06-2005
Unique: 302 | Total: 348
| Access Period:
1040-1053
HTML
XML
PDF
Research Article
A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem
Lan Nguyen
,
Reihaneh Safavi-Naini
,
Kaoru Kurosawa
10.3217/jucs-011-06-0986
28-06-2005
Unique: 326 | Total: 377
| Access Period:
986-1010
HTML
XML
PDF
Research Article
A Novel Scheme for Secured Data Transfer Over Computer Networks
Rangarajan Vasudevan
,
Ajith Abraham
,
Sugata Sanyal
10.3217/jucs-011-01-0104
28-01-2005
Unique: 322 | Total: 379
| Access Period:
104-121
HTML
XML
PDF
Research Article
The kth-Order Nonhomomorphicity of S-Boxes
Yuliang Zheng
,
Xian-Mo Zhang
10.3217/jucs-006-08-0830
28-08-2000
Unique: 315 | Total: 374
| Access Period:
830-848
HTML
XML
PDF
Research Article
Randomness in Multi-Secret Sharing Schemes
Carlo Blundo
,
Barbara Masucci
10.3217/jucs-005-07-0367
28-07-1999
Unique: 283 | Total: 334
| Access Period:
367-389
HTML
XML
PDF
Research Article
Some Basic Properties of General Nonperfect Secret Sharing Schemes
Wakaha Ogata
,
Kaoru Kurosawa
10.3217/jucs-004-08-0690
28-08-1998
Unique: 516 | Total: 600
| Access Period:
690-704
HTML
XML
PDF
Research Article
Linear Multisecret-Sharing Schemes and Error-Correcting Codes
Cunsheng Ding
,
Tero Laihonen
,
Ari Renvall
10.3217/jucs-003-09-1023
28-09-1997
Unique: 304 | Total: 350
| Access Period:
1023-1036
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK