X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (3777) 3777
Conference Proceeding (1652) 1652
Book / eBook (409) 409
Book Chapter (257) 257
Publication (244) 244
Dissertation (84) 84
Government Document (16) 16
Paper (9) 9
Journal / eJournal (5) 5
Magazine Article (5) 5
Book Review (2) 2
Data Set (1) 1
Reference (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
cryptanalysis (4517) 4517
cryptography (1808) 1808
computer science (1008) 1008
security (933) 933
computer science, theory & methods (864) 864
computer science, information systems (850) 850
engineering, electrical & electronic (773) 773
encryption (762) 762
algorithms (688) 688
data encryption (678) 678
authentication (496) 496
cryptology (473) 473
block cipher (449) 449
computer communication networks (440) 440
analysis (439) 439
steganography (426) 426
secret writing (410) 410
telecommunications (407) 407
mathematics, applied (404) 404
differential cryptanalysis (386) 386
computer security (371) 371
mathematics (333) 333
verschlüsselung (321) 321
computer science, hardware & architecture (307) 307
scheme (302) 302
linear cryptanalysis (298) 298
computers (284) 284
ciphers (283) 283
criptografía (263) 263
electronic books (258) 258
algorithm analysis and problem complexity (252) 252
coding and information theory (250) 250
computer science, software engineering (250) 250
data structures, cryptology and information theory (247) 247
image encryption (247) 247
management of computing and information systems (246) 246
kryptologie (240) 240
computer systems (238) 238
chaos (230) 230
systems and data security (229) 229
discrete mathematics in computer science (228) 228
stream cipher (228) 228
algorithm (221) 221
security measures (220) 220
protection (217) 217
smart cards (214) 214
efficient (211) 211
smart card (206) 206
engineering (201) 201
computer information security (197) 197
improvement (195) 195
data encoding (191) 191
encryption of data (191) 191
protocol (188) 188
computer privacy (184) 184
cyber security (184) 184
cybersecurity (184) 184
chaos theory (183) 183
computer system security (181) 181
electronic digital computers (181) 181
protection of computer systems (181) 181
security of computer systems (181) 181
aes (180) 180
permutation (176) 176
block ciphers (170) 170
communications engineering, networks (170) 170
cryptographie (169) 169
physics, multidisciplinary (164) 164
multi-user (162) 162
images (160) 160
mathematical analysis (154) 154
attack (148) 148
cryptography and security (145) 145
privacy (145) 145
computer networks (143) 143
informatique (142) 142
information systems (141) 141
congresses (140) 140
combinatorics (139) 139
diffusion (136) 136
rsa (136) 136
stream ciphers (135) 135
attacks (133) 133
hash function (133) 133
kryptographie (131) 131
access control (130) 130
data security (129) 129
investment analysis (126) 126
methods (125) 125
cryptography congresses (121) 121
maps (121) 121
authentifizierung (120) 120
data protection (120) 120
kongress (120) 120
password authentication (119) 119
password (118) 118
computer communication systems (117) 117
safety and security measures (117) 117
complexity (115) 115
blocking (114) 114
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Robarts - Stacks (61) 61
UofT at Mississauga - Stacks (55) 55
Engineering & Comp. Sci. - Stacks (43) 43
Mathematical Sciences - Stacks (29) 29
Trinity College (John W Graham) - Stacks (24) 24
UofT at Scarborough - Stacks (24) 24
Collection Dvlpm't (Acquisitions) - Vendor file (23) 23
Gerstein Science - Stacks (19) 19
St. Michael's College (John M. Kelly) - 2nd Floor (14) 14
UTL at Downsview - May be requested (10) 10
Collection Dvlpm't (Acquisitions) - Closed Orders (8) 8
Online Resources - Online (8) 8
Victoria University E.J. Pratt - Stacks (4) 4
Mathematical Sciences - Missing (3) 3
Engineering & Comp. Sci. - Missing (2) 2
Engineering & Comp. Sci. - Periodical Stacks (2) 2
Engineering & Comp. Sci. - May be requested in 6-10 wks (1) 1
Law (Bora Laskin) - Stacks (1) 1
Physics - Stacks (1) 1
Robarts - Not Returned (1) 1
Royal Ontario Museum - Stacks (1) 1
Thomas Fisher Rare Book - Rare Book (1) 1
Trinity College (John W Graham) - Storage (1) 1
University College (Laidlaw) - Stacks (1) 1
UofT Schools - Special Collections (1) 1
UofT Schools - Stacks (1) 1
UofT at Mississauga - Periodical Stacks (1) 1
UofT at Mississauga - Reference (1) 1
UofT at Scarborough - Circulation Desk (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (5547) 5547
Japanese (149) 149
Chinese (45) 45
Korean (22) 22
Spanish (18) 18
French (16) 16
Portuguese (10) 10
Russian (9) 9
German (8) 8
Czech (5) 5
Turkish (3) 3
Arabic (1) 1
Italian (1) 1
Latin (1) 1
Persian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE Transactions on Cybernetics, ISSN 2168-2267, 2018, Volume 48, Issue 4, pp. 1163 - 1175
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2010, Volume 6147, pp. 333 - 346
Conference Proceeding
International Journal of Computers and Applications, ISSN 1206-212X, 2018, pp. 1 - 19
Journal Article
Information Processing Letters, ISSN 0020-0190, 08/2018, Volume 136, pp. 5 - 8
We have analysed tweakable block cipher Scream which is used by cipher SCREAM, with the techniques linear cryptanalysis, differential cryptanalysis and related... 
Tweakable block cipher | Differential cryptanalysis | Related key cryptanalysis | Cryptography | Block cipher | Linear cryptanalysis | COMPUTER SCIENCE, INFORMATION SYSTEMS
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2014, Volume 8441, pp. 165 - 182
Conference Proceeding
Signal Processing, ISSN 0165-1684, 01/2016, Volume 118, pp. 203 - 210
In year 2000, an efficient hierarchical chaotic image encryption (HCIE) algorithm was proposed, which divides a plain-image of size with possible value levels... 
Histogram | Permutation | Known-plaintext attack | Chosen-plaintext attack | Chaotic cryptanalysis | ONLY MULTIMEDIA CIPHERS | SCHEME | PLAINTEXT ATTACKS | SECURITY | QUANTITATIVE CRYPTANALYSIS | ENGINEERING, ELECTRICAL & ELECTRONIC | Analysis | Algorithms | Computer Science - Cryptography and Security
Journal Article
Beijing Daxue Xuebao (Ziran Kexue Ban)/Acta Scientiarum Naturalium Universitatis Pekinensis, ISSN 0479-8023, 11/2018, Volume 54, Issue 6, pp. 1173 - 1178
Journal Article
2017, London Mathematical Society lecture note series, ISBN 9781107109353, xiii, 266 pages
Peter L. Montgomery has made significant contributions to computational number theory, introducing many basic tools such as Montgomery multiplication,... 
Montgomery, Peter L., 1947 | Mathematics | Cryptography | Number theory
Book
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2014, Volume 8651, pp. 90 - 107
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2016, Volume 9836, pp. 147 - 163
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2006, Volume 3960, pp. 1 - 20
Journal Article
2005, ISBN 0131828312, xiv, 285
Book
Artificial Intelligence, ISSN 0004-3702, 01/2020, Volume 278, p. 103183
Cryptanalysis aims at testing the properties of encryption processes, and this usually implies solving hard optimization problems. In this paper, we focus on... 
Differential cryptanalysis | Constraint programming | AES | DISTINGUISHER | SEARCH | SECURITY | CRYPTANALYSIS | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | Cryptography and Security | Artificial Intelligence | Computer Science
Journal Article
SCIENTIFIC REPORTS, ISSN 2045-2322, 05/2019, Volume 9, Issue 1, p. 7626
Sealed-bid auction is an important tool in modern economic especially concerned with networks. However, the bidders still lack the privacy protection in... 
IMPROVEMENT | PROTOCOL | CRYPTANALYSIS | MULTIDISCIPLINARY SCIENCES
Journal Article
Computing, ISSN 0010-485X, 2018, Volume 85, Issue 1-2, pp. 77 - 83
Journal Article
Optics Express, ISSN 1094-4087, 11/2013, Volume 21, Issue 23, pp. 27873 - 27890
During the past decades, chaos-based permutation-diffusion type image cipher has been widely investigated to meet the increasing demand for real-time secure... 
STANDARD MAP | CRYPTANALYSIS | OPTICS | ENCRYPTION SCHEME | ALGORITHM
Journal Article
Signal Processing, ISSN 0165-1684, 05/2018, Volume 146, pp. 22 - 32
This paper demonstrates cryptanalysis of an image encryption scheme based on a new 1D chaotic system proposed by Zhou et al. (2014). It is claimed to possess... 
Chaos | Cryptanalysis | Image encryption | Permutation-substitution architecture | ALGORITHM | QUANTITATIVE CRYPTANALYSIS | PERMUTATION | BIT | ENGINEERING, ELECTRICAL & ELECTRONIC | ONLY MULTIMEDIA CIPHERS | SCRAMBLING ENCRYPTION | SECURITY ANALYSIS | EFFICIENT
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 01/2017, Volume 10159, pp. 3 - 18
Journal Article
Information Processing Letters, ISSN 0020-0190, 04/2020, Volume 156, p. 105902
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.