Suggested Topics within your search.
Suggested Topics within your search.
- Algorithms
- Cryptography 31
- Data encryption (Computer science) 9
- Security 9
- Mathematics 8
- Computer science 7
- Number theory 6
- Data Transmission 5
- General And Miscellaneous//Mathematics, Computing, And Information Science 5
- Mathematics And Computing 5
- Communications 4
- Computer Networks 4
- Performance 4
- Algebra 3
- Cryptology 3
- Secrecy Protection 3
- Combinatorial group theory 2
- Computer algorithms 2
- Computer security 2
- General And Miscellaneous//mathematics, Computing, And Information Science 2
- Group theory 2
- Information Theory 2
- Mathematics, Computers, Information Science, Management, Law, Miscellaneous 2
- Noncommutative algebras 2
- Ordered algebraic structures 2
- Verification 2
- Accelerators 1
- Algebra, Boolean 1
- Artificial Intelligence 1
- Artificial intelligence 1
-
1
Introduction to cryptography /
Published 2018Subjects: “…Cryptography Mathematics.…”
Full Text (via ProQuest)
Electronic eBook -
2
Finding Cryptography in Object Code
Published 2008Subjects: Online Access (via OSTI)
Government Document Electronic eBook -
3
Discrete Algebraic Methods : Arithmetic, Cryptography, Automata and Groups /
Published 2016Subjects: Full Text (via ProQuest)
eBook -
4
Deep Reinforcement Learning Frontiers of Artificial Intelligence /
Published 2019Subjects: Online Access (A-Z Journals and Newspapers)
Electronic eBook -
5
Introduction to cryptography /
Published 2018Subjects: “…Cryptography Mathematics.…”
Full Text (via Taylor & Francis)
eBook -
6
Non-commutative cryptography and complexity of group-theoretic problems /
Published 2011Subjects: Full Text (via EBSCO)
eBook -
7
-
8
-
9
Manticore and CS mode parallelizable encryption with joint cipher-state authentication.
Published 2004Subjects: Online Access (via OSTI)
Government Document Electronic eBook -
10
Parallelism of the SANDstorm hash algorithm.
Published 2009Subjects: Online Access
Government Document Electronic eBook -
11
Algorithms for improved performance in cryptographic protocols.
Published 2003Subjects: Online Access (via OSTI)
Government Document Electronic eBook -
12
Key management for large scale end-to-end encryption
Published 1994Subjects: Online Access
Government Document Electronic eBook -
13
Algorithmic problems of group theory, their complexity, and applications to cryptography /
Published 2015Subjects: Full Text (via ProQuest)
eBook -
14
Discrete algebraic methods : arithmetic, cryptography, automata, and groups /
Published 2016Subjects:Book -
15
The data embedding method
Published 1996Subjects: Online Access
Government Document Electronic eBook -
16
Proposed DSS-specific fields for the generic authentication information element
Published 1995Subjects: Online Access
Government Document Electronic eBook -
17
Understand, Manage, and Prevent Algorithmic Bias A Guide for Business Users and Data Scientists /
Published 2019Subjects: Online Access (A-Z Journals and Newspapers)
Electronic eBook -
18
Enhancements for distributed certificate authority approaches for mobile wireless ad hoc networks.
Published 2003Subjects: Online Access (via OSTI)
Government Document Electronic eBook -
19
Securing mobile code.
Published 2004Subjects: Online Access (via OSTI)
Government Document Electronic eBook -
20
The Authenticated Tracking and Monitoring System (ATMS) concept
Published 1993Subjects: Online Access
Government Document Electronic eBook