Showing 1 - 20 results of 75 for search '"cryptographer"', query time: 0.04s Refine Results
  1. 1
    “…Cryptographic hash function is a function that takes an arbitrary length as an input and produces…”
    Get full text
    Get full text
    Get full text
  2. 2
    by Brown
    Published 1998
    Subjects: “…Cryptographers Fiction…”
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
    “…Cryptographic hash function verifies data integrity and sender identity or source of information…”
    Get full text
    Get full text
    Get full text
    Get full text
  8. 8
    by Taha, Imad, Alahmad, Mohammad A.
    Published 2015
    “…Cryptographic hash function verifies data integrity and sender identity or source of information…”
    Get full text
    Get full text
    Get full text
  9. 9
  10. 10
    “… via eavesdropping and information leaking operations. Therefore, some cryptographic algorithms have…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
  11. 11
    “…This paper presents a novel mechanism of cryptographic one-to-many reversible mapping between two…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
  12. 12
  13. 13
    by Mai
    Published 2014
    Subjects: “…Cryptographers Fiction…”
  14. 14
    by Clark
    Published 1977
    Subjects: “…Cryptographers United States Biography…”
  15. 15
  16. 16
    “… of cryptographic systems against any potential attack is determined by several criteria which the cryptographic…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
  17. 17
    “… cellular networks requirements. Apparently, there are three sets of cryptographic algorithms that work…”
    Get full text
    Get full text
    Get full text
  18. 18
  19. 19
    by Brown
    Published 2003
    Subjects: “…Cryptographers Fiction…”
  20. 20
    by Brown
    Published 2003
    Subjects: “…Cryptographers Fiction…”
Search Tools: RSS Feed Email Search