Security Evaluation of Cryptosystems based on Orthogonal Transformation
暂无分享,去创建一个
[1] Sattar B. Sadkhan,et al. Cryptosystem Security Evaluation Based on Diagonal Game and Information Theory , 2018, 2018 International Conference on Engineering Technology and their Applications (IICETA).
[2] Soumitra Bhattacharya. Cryptology and Information Security - Past, Present, and Future Role in Society , 2019 .
[3] Mark Stamp,et al. Information security - principles and practice , 2005 .
[4] Sattar B. Sadkhan,et al. Security Evaluation of Nonlinear Filterization Stream Cipher Based on Information Theory , 2014 .
[5] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[6] Sattar B. Sadkhan,et al. Complexity Evaluation of Constructing Method for Saturated Best Resilient Functions in Stream Cipher Design , 2019, 2019 1st AL-Noor International Conference for Science and Technology (NICST).
[7] Sattar B. Sadkhan,et al. A Proposed Security Evaluation Method for Bluetooth E0 Based on Fuzzy Logic , 2018, 2018 International Conference on Advanced Science and Engineering (ICOASE).
[8] Sattar B. Sadkhan,et al. Proposed Enhancement of A5/1 stream cipher , 2019, 2019 2nd International Conference on Engineering Technology and its Applications (IICETA).
[9] Sattar B. Sadkhan Al Maliky,et al. Multidisciplinary in Cryptology , 2014 .
[10] Sattar B. Sadkhan,et al. Block cipher security evaluation based on fuzzy logic , 2013, 2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE).
[11] Gerhard Goos,et al. Applied Cryptography and Network Security , 2012, Lecture Notes in Computer Science.
[12] Ziad Alqadi,et al. Analysis of Stream Cipher Security Algorithm , 2007 .
[13] Sattar B. Sadkhan,et al. Security evaluation of cryptosystems used in cloud networks , 2016, 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA).
[14] Sattar B. Sadkhan Al Maliky,et al. RSA-Public Key Cryptosystems Based on Quadratic Equations in Finite Field , 2014 .
[15] Steve Burnett,et al. RSA Security's official guide to cryptography , 2001 .
[16] Sattar B. Sadkhan,et al. A DNA-Sticker Algorithm for Cryptanalysis LFSRs and NLFSRs Based Stream Cipher , 2018, 2018 International Conference on Advanced Science and Engineering (ICOASE).