نتایج جستجو برای: resilient cryptography

تعداد نتایج: 52839  

Journal: :International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2021

Journal: :ЖУРНАЛ ЗА БЕЗБЈЕДНОСТ И КРИМИНАЛИСТИКУ 2019

1997
Xian-Mo Zhang Yuliang Zheng

| This paper studies resilient functions which have applications in fault-tolerant distributed computing, quantum cryptographic key distribution and random sequence generation for stream ciphers. We present a number of new methods for synthesizing resilient functions. An interesting aspect of these methods is that they are applicable both to linear and to nonlinear resilient functions. Our seco...

Journal: :Europhysics News 1997

Journal: :The Computer Journal 1982

Journal: :Journal of Physics: Conference Series 2005

Journal: :IEEE Trans. Information Theory 1997
Xian-Mo Zhang Yuliang Zheng

This paper studies resilient functions which have applications in fault-tolerant distributed computing , quantum cryptographic key distribution and random sequence generation for stream ciphers. We present a number of methods for synthesizing resilient functions. An interesting aspect of these methods is that they are applicable both to linear and to nonlinear resilient functions. Our second ma...

1995
Xian Mo Zhang Yuliang Zheng

This paper studies resilient functions which have applications in fault tolerant dis tributed computing quantum cryptographic key distribution and random sequence gen eration for stream ciphers We present a number of methods for synthesizing resilient functions An interesting aspect of these methods is that they are applicable both to linear and to nonlinear resilient functions Our second major...

2014
T. Anuradha Usha Rani

Visual cryptography is the techniques that deal with providing security to the multimedia data. The main concept behind this is, to encrypt a secret image into some shares. The secret can be revealed only when all the shares are combined. The central theme of visual cryptography is that it doesn’t require any manipulation or tough cryptographic knowledge and the decryption is done by human visi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید