skip to main content
Language:
Results 1 2 3 4 5 next page
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Developing Blockchain Solutions in the Cloud: Design and Develop Blockchain-Powered Web3 Apps on AWS, Azure, and GCP
Material Type:
Book
Add to My Research

Developing Blockchain Solutions in the Cloud: Design and Develop Blockchain-Powered Web3 Apps on AWS, Azure, and GCP

ISBN: 9781837630172 ;ISBN: 1837630178 ;EISBN: 183763887X ;EISBN: 9781837638871 ;OCLC: 1428904320

Digital Resources/Online E-Resources

2
Symmetric Cryptography, Volume 2: Cryptanalysis and Future Directions
Material Type:
Book
Add to My Research

Symmetric Cryptography, Volume 2: Cryptanalysis and Future Directions

EISBN: 1394256302 ;EISBN: 9781394256303

Digital Resources/Online E-Resources

3
Blockchain for Healthcare 4. 0: Technology, Challenges, and Applications
Material Type:
Book
Add to My Research

Blockchain for Healthcare 4. 0: Technology, Challenges, and Applications

ISBN: 1032527587 ;ISBN: 9781032527581 ;EISBN: 9781003819288 ;EISBN: 1003819281 ;OCLC: 1409681981

Digital Resources/Online E-Resources

4
Malware Analysis: Digital Forensics, Cybersecurity, And Incident Response
Material Type:
Book
Add to My Research

Malware Analysis: Digital Forensics, Cybersecurity, And Incident Response

EISBN: 1839385308 ;EISBN: 9781839385308 ;OCLC: 1407315486

Digital Resources/Online E-Resources

5
From the archive
Material Type:
Article
Add to My Research

From the archive

Nature (London), 2023-06, Vol.618 (7963), p.37-37 [Peer Reviewed Journal]

Copyright Nature Publishing Group Jun 1, 2023 ;ISSN: 0028-0836 ;EISSN: 1476-4687 ;DOI: 10.1038/d41586-023-01742-2

Digital Resources/Online E-Resources

6
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post‐quantum proposals
Material Type:
Article
Add to My Research

Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post‐quantum proposals

IET information security, 2023-03, Vol.17 (2), p.159-160 [Peer Reviewed Journal]

2022 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology. ;ISSN: 1751-8709 ;EISSN: 1751-8717 ;DOI: 10.1049/ise2.12105

Full text available

7
Special Issue of INFORMS Journal on Applied Analytics—Blockchain Analytics
Material Type:
Article
Add to My Research

Special Issue of INFORMS Journal on Applied Analytics—Blockchain Analytics

Interfaces (Providence), 2020-09, Vol.50 (5), p.340-341 [Peer Reviewed Journal]

COPYRIGHT 2020 Institute for Operations Research and the Management Sciences ;Copyright Institute for Operations Research and the Management Sciences Sep/Oct 2020 ;ISSN: 0092-2102 ;EISSN: 1526-551X ;DOI: 10.1287/inte.2020.1053

Digital Resources/Online E-Resources

8
Retracted: A Comprehensive Survey on Sharding in Blockchains
Material Type:
Article
Add to My Research

Retracted: A Comprehensive Survey on Sharding in Blockchains

Mobile information systems, 2022-07, Vol.2022, p.1-1 [Peer Reviewed Journal]

Copyright © 2022 Mobile Information Systems. ;Copyright © 2022 Mobile Information Systems. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1574-017X ;EISSN: 1875-905X ;DOI: 10.1155/2022/9864217

Digital Resources/Online E-Resources

9
A Solution to Defend Cloud Auditing Protocols from A Potential Attack
Material Type:
Article
Add to My Research

A Solution to Defend Cloud Auditing Protocols from A Potential Attack

Journal of physics. Conference series, 2020-01, Vol.1437 (1), p.12112 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;2020. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1437/1/012112

Full text available

10
Caveat Implementor! Key Recovery Attacks on MEGA
Material Type:
Conference Proceeding
Add to My Research

Caveat Implementor! Key Recovery Attacks on MEGA

Lecture Notes in Computer Science, 2023 [Peer Reviewed Journal]

info:eu-repo/semantics/openAccess http://rightsstatements.org/page/InC-NC/1.0/ In Copyright - Non-Commercial Use Permitted ;ISSN: 1611-3349 ;ISSN: 0302-9743 ;ISBN: 9783031305887 ;ISBN: 9783031305894 ;ISBN: 3031305892 ;ISBN: 3031305884 ;EISSN: 1611-3349 ;DOI: 10.3929/ethz-b-000614276

Digital Resources/Online E-Resources

11
Cryptanalysis Attacks for Factoring Generalized Takagi's Scheme N = prqs
Material Type:
Article
Add to My Research

Cryptanalysis Attacks for Factoring Generalized Takagi's Scheme N = prqs

New trends in mathematical sciences, 2022-06, Vol.10 (1), p.54-66

2022. This work is published under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;EISSN: 2147-5520 ;DOI: 10.20852/ntmsci.2022.464

Full text available

12
A New Method for Differential Cryptanalysis on Addition on Residue Class Ring Z/2 n Z
Material Type:
Article
Add to My Research

A New Method for Differential Cryptanalysis on Addition on Residue Class Ring Z/2 n Z

Journal of physics. Conference series, 2019-03, Vol.1176 (4), p.42019 [Peer Reviewed Journal]

2019. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1176/4/042019

Full text available

13
A Novel Iterated Function System-Based Model for Coloured Image Encryption
Material Type:
Article
Add to My Research

A Novel Iterated Function System-Based Model for Coloured Image Encryption

International journal of systems and software security and protection, 2021-07, Vol.12 (2), p.1-10 [Peer Reviewed Journal]

Copyright © 2021, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. ;ISSN: 2640-4265 ;EISSN: 2640-4273 ;DOI: 10.4018/IJSSSP.2021070101

Digital Resources/Online E-Resources

14
Quantum secret kept for a day
Material Type:
Article
Add to My Research

Quantum secret kept for a day

Nature (London), 2016-10, Vol.538 (7624), p.142-142 [Peer Reviewed Journal]

Copyright Nature Publishing Group Oct 13, 2016 ;ISSN: 0028-0836 ;EISSN: 1476-4687 ;DOI: 10.1038/538142c ;CODEN: NATUAS

Full text available

15
Guest Editor's Introduction: Special Issue on Paradigm Shifts in Cryptographic Engineering
Material Type:
Article
Add to My Research

Guest Editor's Introduction: Special Issue on Paradigm Shifts in Cryptographic Engineering

IEEE transactions on dependable and secure computing, 2019-01, Vol.16 (5)

Copyright IEEE Computer Society 2019 ;ISSN: 1545-5971 ;EISSN: 1941-0018

Digital Resources/Online E-Resources

16
Improved linear (hull) cryptanalysis of round-reduced versions of SIMON
Material Type:
Article
Add to My Research

Improved linear (hull) cryptanalysis of round-reduced versions of SIMON

Science China. Information sciences, 2017-03, Vol.60 (3), p.39101 [Peer Reviewed Journal]

Science China Press and Springer-Verlag Berlin Heidelberg 2016. ;ISSN: 1674-733X ;EISSN: 1869-1919 ;DOI: 10.1007/s11432-015-0007-1

Digital Resources/Online E-Resources

17
Manual de criptografía: fundamentos matemáticos de la criptografía para un estudiante de grado
Material Type:
Book
Add to My Research

Manual de criptografía: fundamentos matemáticos de la criptografía para un estudiante de grado

ISBN: 8413114640 ;ISBN: 9788413114644 ;EISBN: 8413114632 ;EISBN: 9788413114637

Digital Resources/Online E-Resources

18
CRYPTOGRAPHY AND STEGANOGRAPHY, METHODS TO HIDE INTELLIGENCE PRODUCTS
Material Type:
Article
Add to My Research

CRYPTOGRAPHY AND STEGANOGRAPHY, METHODS TO HIDE INTELLIGENCE PRODUCTS

Bulletin of "Carol I" National Defense University, 2018-01, Vol.7 (1), p.48 [Peer Reviewed Journal]

2018. This work is published under https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2284-936X ;EISSN: 2284-9378

Full text available

19
Criptólogos Profesionales (Professional Cryptologists)
Material Type:
Book
Add to My Research

Criptólogos Profesionales (Professional Cryptologists)

EISBN: 9781728479736 ;EISBN: 1728479738 ;OCLC: 1351752009

Digital Resources/Online E-Resources

20
Codigos y cifrados clasicos (Classic Codes and Ciphers)
Material Type:
Book
Add to My Research

Codigos y cifrados clasicos (Classic Codes and Ciphers)

EISBN: 9781728479651 ;EISBN: 1728479657

Digital Resources/Online E-Resources

Personalize your results

  1. Edit

Refine Search Results

Refine My Results

Creation Date 

From To
  1. Before 1957  (40,283)
  2. 1957 To 1972  (27,558)
  3. 1973 To 1988  (209,739)
  4. 1989 To 2005  (515,535)
  5. After 2005  (1,457,523)
  6. More options open sub menu

Subject 

  1. Cryptography  (2,212,421)
  2. Physics  (2,151,656)
  3. Education  (2,149,029)
  4. Advertising  (2,148,676)
  5. Seals  (2,148,563)
  6. Display  (2,148,559)
  7. Signs  (866,065)
  8. Displaying  (866,053)
  9. Labels Or Name-Plates  (866,053)
  10. Electricity  (559,429)
  11. Globes  (484,932)
  12. Diagrams  (484,931)
  13. Planetaria  (484,930)
  14. Educational Or Demonstration Appliances  (484,929)
  15. Appliances For Teaching, Or Communicating With, The Blind,deaf Or Mute  (484,929)
  16. Counting  (413,215)
  17. Computing  (413,192)
  18. Calculating  (413,152)
  19. Optics  (341,930)
  20. Electric Digital Data Processing  (292,802)
  21. More options open sub menu

Language 

  1. English  (1,944,685)
  2. Chinese  (541,711)
  3. French  (230,943)
  4. German  (162,443)
  5. Korean  (128,211)
  6. Japanese  (120,530)
  7. Spanish  (23,384)
  8. Russian  (17,884)
  9. Portuguese  (11,858)
  10. Italian  (7,314)
  11. Swedish  (3,995)
  12. Dutch  (3,406)
  13. Finnish  (2,658)
  14. Danish  (2,632)
  15. Polish  (2,572)
  16. Norwegian  (1,762)
  17. Ukrainian  (1,691)
  18. Czech  (1,403)
  19. Turkish  (1,233)
  20. Romanian  (675)
  21. More options open sub menu

Searching Remote Databases, Please Wait