How to break Gifford's cipher (extended abstract)
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Secure Communication with Chaotic Systems of Difference Equations
IEEE Transactions on Computers
EurAsia-ICT '02 Proceedings of the First EurAsian Conference on Information and Communication Technology
Low-Complexity Bit-Parallel Systolic Montgomery Multipliers for Special Classes of GF(2^m)
IEEE Transactions on Computers
High-capacity image hiding scheme based on vector quantization
Pattern Recognition
Methods of finding multiplicative inverses in GF(28)
Computer Communications
Unified parallel systolic multiplier over GF(2m)
Journal of Computer Science and Technology
Low-complexity bit-parallel multipliers for a class of GF(2m) based on modified Booth's algorithm
International Journal of Computers and Applications
A simple image encoding method with data lossless information hiding
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
Optimizing least-significant-bit substitution using cat swarm optimization strategy
Information Sciences: an International Journal
Scalable Gaussian Normal Basis Multipliers over GF(2m) Using Hankel Matrix-Vector Representation
Journal of Signal Processing Systems
Hi-index | 0.01 |
From the Publisher:This book provides a practical introduction to cryptographic principles and algorithms for communication security and data privacy-both commercial and military-written by one of the world's leading authorities on encryption and coding. Covering the latest developments in cryptography for all data communication professionals who need an understanding of cryptographic technology,the book explains the Data Encryption Standard,stream ciphers,public-key cryptosystems,arithmetic operating circuits,important classes of BCH and Reed-Solomon codes for multiple-error correction,ciphertext protection against illegal deletion or injection of information,practical cryptographic applications,and more.