Buscar
Mostrando ítems 1-10 de 214
A Novel Approach for Pseudo-Random Seed Generation
(Computación y Sistemas; Vol. 17 No. 1, 2013-03-06)
Abstract: Random sequences play an important role in all aspects of Cryptography. All cryptographic systems and protocols are based on secrets and can only be as strong as the random sequence generators they use to generate ...
Additive cipher
(Wolfram Demonstration Project, 2016)
Additive cipher
(Wolfram Demonstration Project, 2013)
Clustering based physical-layer authentication in edge computing systems with asymmetric resources
(MDPI AG, 2019)
In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcome the drawback of traditional cipher-based authentication schemes that suffer from heavy costs and are limited by ...
Criptografia com caosCryptography with chaos
(Universidade do Vale do Rio do Sinos, 2009-03-25)
The technological advance and value of information in the preset days lead to a constant search for more efficient, secure and adaptable ciphers. While de security is based on the complicated behavior of the algorithms, ...
Criptografia com caosCryptography with chaos
(Universidade do Vale do Rio do Sinos, 2009-03-25)
The technological advance and value of information in the preset days lead to a constant search for more efficient, secure and adaptable ciphers. While de security is based on the complicated behavior of the algorithms, ...