Cryptography and Its Applications in Information Security
Cryptography and Its Applications in Information Security
English[eng]
9783040000000
bit independence criterion||bit independence||RC4||stream cipher||complexity||chaos-based stream cipher||SPCNG||3D chebyshev||logistic||skew-tent||FPGA||performance||museum||digital copyright management||blockchain||smart contract||authorization model||coupled map lattice||intermittent jumping||multi-chaos||public key exchange||security||asymmetric||asymmetric algorithm||cryptography||framework||limited computational power||computationally biased||intrusion detection systems||machine learning||communication||digital cash||privacy||privacy preserving||homomorphic encryption||federated learning||n/a
English[eng]
9783040000000
bit independence criterion||bit independence||RC4||stream cipher||complexity||chaos-based stream cipher||SPCNG||3D chebyshev||logistic||skew-tent||FPGA||performance||museum||digital copyright management||blockchain||smart contract||authorization model||coupled map lattice||intermittent jumping||multi-chaos||public key exchange||security||asymmetric||asymmetric algorithm||cryptography||framework||limited computational power||computationally biased||intrusion detection systems||machine learning||communication||digital cash||privacy||privacy preserving||homomorphic encryption||federated learning||n/a