about
Some methods for blindfolded record linkageQuantum algorithms for algebraic problemsEfficient security mechanisms for mHealth applications using wireless body sensor networksSecure verifier-based three-party authentication schemes without server public keys for data exchange in telecare medicine information systems.Extending the IEEE 802.15.4 security suite with a compact implementation of the NIST P-192/B-163 elliptic curves.Location-aware dynamic session-key management for grid-based Wireless Sensor Networks.RUASN: a robust user authentication framework for wireless sensor networksA Temporal Credential-Based Mutual Authentication with Multiple-Password Scheme for Wireless Sensor Networks.Three-party authenticated key agreements for optimal communication.Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of ThingsOne Step Quantum Key Distribution Based on EPR Entanglement.Unfalsifiability of security claims.Redactable signatures for signed CDA Documents.Volumetric Light-field Encryption at the Microscopic Scale.Authenticated key agreement with rekeying for secured body sensor networksA secure integrated medical information system.An Embedded Sensor Node Microcontroller with Crypto-ProcessorsSecurity protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability.Experimental measurement-device-independent quantum digital signatures.Approach to design neural cryptography: a generalized architecture and a heuristic rule.Public-key encryption with chaos.DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation.Evolutionary Algorithms for Boolean Functions in Diverse Domains of Cryptography.Post-quantum cryptography.Modifying the ECC-based grouping-proof RFID system to increase inpatient medication safety.Synchronization and an application of a novel fractional order King Cobra chaotic system.Free-Space Quantum Signatures Using Heterodyne Measurements.Novel public key encryption technique based on multiple chaotic systems.A secure and fair joint E-lottery protocol.A more secure authentication scheme for telecare medicine information systems.A secure authentication scheme for telecare medicine information systems.On Constructing Dynamic and Forward Secure Authenticated Group Key Agreement Scheme from Multikey Encapsulation Mechanism.RFC 8446: The Transport Layer Security (TLS) Protocol Version 1.3NSA and Dual EC_DRBG: Déjà Vu All Over Again?Imperfect Forward SecrecyCurve25519: New Diffie-Hellman Speed RecordsOptimal Randomness Extraction from a Diffie-Hellman ElementPassword-Authenticated Group Key Agreement with Adaptive Security and ContributivenessEncoding-Free ElGamal Encryption Without Random OraclesThe Twist-AUgmented Technique for Key Exchange
P2860
Q24791839-1D3A50D7-88C9-42D9-9839-18C1911ADFADQ27350179-4639FAAB-1623-4869-A4B9-0A9C5478325FQ30462108-DC925F79-180A-4E30-87A0-DCD2555AE41AQ30796109-85AD8FD7-7D24-4501-AB45-638C9BBF8820Q31125621-47E6CBC8-B484-4F4D-A9BA-0B39814FF06DQ35593942-B7C97210-2B0D-4C0E-A966-E22BC8A39ABDQ35594376-991396CA-7FA9-475C-8CED-793C3BA2ABEFQ36263832-2C4785AC-CA95-4270-B365-02EC90AFA71CQ36326767-2BB778A1-8DC3-40A8-9F10-058C173FB103Q36517958-108117E0-B19E-439B-AD89-90897C917E4EQ37054295-0DBD14EE-0232-4123-8A13-F33EE1C767E3Q37183746-0BBFB62D-4682-48C2-940C-B51A9F8679D3Q38429309-555E0597-5D04-41B6-AFB8-9FDB03802DE4Q39036644-52138AF5-F438-4484-9D28-CA93C40F6900Q39624520-2F053D97-0583-46D1-AE1D-E628572B5308Q39690847-D8E1A2A3-AE39-4227-9B2E-711546B4B738Q39809874-5C9D0BBD-1375-4D27-ADFC-FD62F0775738Q39929979-BE9CE913-47FE-4D8C-B749-88A52DEC8CD4Q42645880-96721B65-3F8F-4752-A3F3-9E032C751F98Q43727817-92AB2AEF-B307-453F-B4F6-9E3DB7D93121Q46538197-B1EE632C-353C-41D4-B4E5-E463A4703CE7Q47284536-015CB73D-ECFF-4999-BA03-E01A2224764EQ47408662-F2687C05-9347-4467-A9EA-4BABDF440476Q47687794-4CADE0C1-62B0-4701-A7FA-3099A4D23387Q50614032-3064F4E0-40CD-4019-99B4-B9551402EF59Q51030544-906DD213-2F0B-448B-84E4-9BB256118047Q51161793-A39244D2-C0EF-44D0-860D-FC34DFD5CE3FQ51345872-3D962C8E-A832-4D6D-BAE8-EFB931DFE666Q51588582-369F134E-62C4-4E79-8FDF-E36D6D039E5DQ51598131-F3CA251B-99CB-4CD7-94A4-A39B45F4920EQ51610640-55153661-7178-4C12-9FCB-55A5A12CDD2CQ51692393-3DF6B51E-4E18-4BF9-B389-5C80C53478C7Q56055033-d756e937-4d48-a7e7-a48a-14f666b86b64Q56058267-5208B443-286E-4BE5-97A6-13054BCF4B40Q56639653-79AF297C-7654-46BC-A358-05B64303E0FFQ56688362-70992FF8-F169-466F-9397-C03B06DA0395Q56921123-5F5F9005-825B-4AFC-8428-DC9E99A8648BQ56921127-6C9FD353-D906-4EC4-A102-DE7840B76F6BQ56921226-F767B36C-6F3B-421A-ADA9-7D19008CA487Q56921253-3B7C146B-259B-4FDA-AD15-7235E552561C
P2860
description
1976 թուականի Նոյեմբերին հրատարակուած գիտական յօդուած
@hyw
1976 թվականի նոյեմբերին հրատարակված գիտական հոդված
@hy
Diffie W., Hellman M. (...) // IEEE Trans. Inf. Theory — IEEE, 1976
@en
artículu científicu espublizáu en 1976
@ast
im November 1976 veröffentlichter wissenschaftlicher Artikel
@de
vědecký článek
@cs
wetenschappelijk artikel (gepubliceerd in 1976-11)
@nl
наукова стаття, опублікована в листопаді 1976
@uk
name
New Directions in Cryptography
@ast
New Directions in Cryptography
@da
New Directions in Cryptography
@de
New Directions in Cryptography
@en
New Directions in Cryptography
@fo
New Directions in Cryptography
@fr
New Directions in Cryptography
@is
New Directions in Cryptography
@kl
New Directions in Cryptography
@nb
New Directions in Cryptography
@nl
type
label
New Directions in Cryptography
@ast
New Directions in Cryptography
@da
New Directions in Cryptography
@de
New Directions in Cryptography
@en
New Directions in Cryptography
@fo
New Directions in Cryptography
@fr
New Directions in Cryptography
@is
New Directions in Cryptography
@kl
New Directions in Cryptography
@nb
New Directions in Cryptography
@nl
prefLabel
New Directions in Cryptography
@ast
New Directions in Cryptography
@da
New Directions in Cryptography
@de
New Directions in Cryptography
@en
New Directions in Cryptography
@fo
New Directions in Cryptography
@fr
New Directions in Cryptography
@is
New Directions in Cryptography
@kl
New Directions in Cryptography
@nb
New Directions in Cryptography
@nl
P3181
P356
P1476
New Directions in Cryptography
@en
P304
P3181
P356
10.1109/TIT.1976.1055638
P407
P577
1976-11-01T00:00:00Z