Amanote Research

Amanote Research

    RegisterSign In

Questions of Application of Applied Homomorphic Cryptography

Voprosy kiberbezopasnosti
doi 10.21681/2311-3456-2019-5-70-74
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2019

Authors
Gurgen Arakelov
Publisher

I.E. Makarenko GI


Related search

Applied Cryptography in Infrastructure-Free Wireless Networks

2011English

Applied Cryptography: Protocols, Algorithms, and Source Code in C

Computer Law and Security Review
ManagementBusinessComputer NetworksCommunicationsAccountingLaw
1994English

Application of Visual Cryptography for Learning in Optics and Photonics

2016English

Application of Dynamic Visual Cryptography for Optical Control of Chaotic Oscillations

Vibroengineering Procedia
ControlSystems EngineeringElectronic EngineeringMechanical EngineeringMaterials ScienceOcean EngineeringElectrical
2017English

Left Invertibility of Output-Quantized Systems: An Application to Cryptography

2010English

Efficient Application of Hybrid 150/90 Cellular Automata to Symmetric Cryptography

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2006English

Research in the Application of Quantum Cryptography Communication Technology for Launch Vehicle Range

2017English

Multi-Key Homomorphic Authenticators

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2016English

Parallel Homomorphic Encryption

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2026 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy