Towards BIMAX: Binary Inclusion-MAXimal Parallel Implementation for Gene Expression Analysis Alejandra. | 0 | 0.34 | 2020 |
Conversion of Element Representations in Galois Rings | 0 | 0.34 | 2020 |
Side Attacks on Stegosystems Executing Message Encryption Previous to Embedding. | 0 | 0.34 | 2020 |
Cipher Modification Against Steganalysis Based on NIST Tests | 0 | 0.34 | 2019 |
Information theoretical secure key sharing protocol for noiseless public constant parameter channels without cryptographic assumptions | 0 | 0.34 | 2019 |
Secret Key Sharing Protocol between Units Connected by Wireless MIMO Fading Channels. | 0 | 0.34 | 2018 |
Steganalysis Based on Statistical Properties of the Encrypted Messages. | 0 | 0.34 | 2017 |
Proof of Correspondence between Keys and Encoding Maps in an Authentication Code. | 0 | 0.34 | 2017 |
Design of Audio Digital Watermarking System Resistant to Removal Attack. | 0 | 0.34 | 2017 |
Semi-Fragile Image Authentication based on CFD and 3-Bit Quantization. | 0 | 0.34 | 2016 |
Authentication codes based on resilient Boolean maps | 1 | 0.37 | 2016 |
Design of High Speed Stegosystem Based on Trellis Codes Jointly with Generalised Viterbi Algorithm. | 0 | 0.34 | 2016 |
Trajectory Graphs Appearing from the Skein Problems Trajectory Graphs Appearing from the Skein Problems at the Hypercube. | 0 | 0.34 | 2016 |
Zero Knowledge Authentication Protocols With Algebraic Geometry Techniques. | 0 | 0.34 | 2016 |
Accelerating All-Sources BFS Metrics on Multi-core Clusters for Large-Scale Complex Network Analysis. | 0 | 0.34 | 2016 |
Secret key agreement based on a communication through wireless MIMO-based fading channels. | 0 | 0.34 | 2016 |
Partitioning of complex networks for heterogeneous computing: A methodological approach | 0 | 0.34 | 2016 |
Using the generalised Viterbi algorithm to achieve a highly effective stegosystem for images | 0 | 0.34 | 2015 |
Analysis of Keyless Massive MIMO-based Cryptosystem Security. | 0 | 0.34 | 2015 |
A Linear Code and its Application into Secret Sharing. | 0 | 0.34 | 2015 |
An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities | 1 | 0.41 | 2015 |
An ILP approach for the traveling repairman problem with unit time windows | 0 | 0.34 | 2015 |
Concatenated digital watermarking system robust to different removal attacks. | 0 | 0.34 | 2014 |
Authentication Schemes Based on Resilient Maps. | 1 | 0.37 | 2014 |
Wire-tap channel concept in nature and society | 0 | 0.34 | 2014 |
Audio Watermarking Based on Echo Hiding with Zero Error Probability. | 0 | 0.34 | 2013 |
A stegosystem with blind decoder based on a noisy channel | 0 | 0.34 | 2013 |
On Formal Expressions of BRW-polynomials. | 0 | 0.34 | 2013 |
The Capacity of a Stegosystem for the Noisy Attack Channel. | 0 | 0.34 | 2012 |
Optimization of key distribution protocols based on extractors for noisy channels within active adversaries | 1 | 0.38 | 2012 |
Selección aleatoria de árboles generadores en gráficas. | 0 | 0.34 | 2012 |
A Multiple Robust Digital Watermarking System for Still Images. | 0 | 0.34 | 2012 |
Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna | 2 | 0.39 | 2011 |
Stegosystems Based on Noisy Channels. | 2 | 0.43 | 2011 |
Robust Digital Watermarking System for Still Images. | 4 | 0.69 | 2011 |
Solinas primes of small weight for fixed sizes | 1 | 0.44 | 2010 |
Collusion-Resistant Fingerprints Based on Real Superimposed Codes. | 0 | 0.34 | 2010 |
A Geometric Presentation of Probabilistic Satisfiability | 0 | 0.34 | 2010 |
Two identification protocols based on Cayley graphs of Coxeter groups. | 0 | 0.34 | 2010 |
On the hamiltonian operators for adiabatic quantum reduction of SAT | 0 | 0.34 | 2010 |
Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary | 1 | 0.35 | 2010 |
Undetectable spread-time stegosystem based on noisy channels | 1 | 0.70 | 2010 |
Cryptographic Methods During the Mexican Revolution | 0 | 0.34 | 2009 |
Collusion-resistant fingerprints based on the use of superimposed codes in real vector spaces | 0 | 0.34 | 2009 |
Searching Prime Numbers With Short Binary Signed Representation | 0 | 0.34 | 2009 |
On differences of quadratic residues. | 0 | 0.34 | 2008 |
Low-Complexity Bit-Parallel Square Root Computation over GF(2^{m}) for All Trinomials | 7 | 0.54 | 2008 |
ECA-Rule Visual Programming for Ubiquitous and Nomadic Computing | 0 | 0.34 | 2008 |
Wet Paper Coding for Watermarking of Binary Images | 1 | 0.40 | 2008 |
Key Distribution Protocols Based on Noisy Channels in Presence of an Active Adversary: Conventional and New Versions With Parameter Optimization | 11 | 0.72 | 2008 |