X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (3782) 3782
Conference Proceeding (1534) 1534
Dissertation (279) 279
Book Chapter (169) 169
Publication (150) 150
Book / eBook (41) 41
Magazine Article (39) 39
Paper (7) 7
Reference (3) 3
Government Document (2) 2
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
cryptography (1316) 1316
cryptosystem (829) 829
security (756) 756
encryption (751) 751
engineering, electrical & electronic (703) 703
computer science, theory & methods (661) 661
computer science, information systems (659) 659
cryptosystems (655) 655
algorithms (510) 510
elliptic curve cryptosystem (498) 498
computer science (489) 489
computer science, hardware & architecture (393) 393
public key cryptosystem (356) 356
authentication (347) 347
public-key cryptosystem (344) 344
mathematics, applied (332) 332
public key cryptography (328) 328
cryptanalysis (327) 327
elliptic curve cryptography (323) 323
data encryption (317) 317
telecommunications (278) 278
verschlüsselung (242) 242
analysis (239) 239
elliptic curve cryptosystems (233) 233
public key (218) 218
scheme (207) 207
privacy (204) 204
暗号 (201) 201
elliptic curves (197) 197
computer science, software engineering (195) 195
mathematics (189) 189
digital signature (185) 185
optics (185) 185
computer systems (181) 181
algorithm (178) 178
computer communication networks (178) 178
rsa cryptosystem (175) 175
information security (157) 157
rsa (157) 157
digital signatures (153) 153
protocols (144) 144
public-key cryptosystems (143) 143
情報 (143) 143
hardware (140) 140
polynomials (139) 139
computer information security (138) 138
public key cryptosystems (134) 134
scalar multiplication (132) 132
image encryption (131) 131
data security (129) 129
information (128) 128
computation (127) 127
signatures (127) 127
computer security (126) 126
chaos (123) 123
cloud computing (122) 122
mathematical analysis (119) 119
research (117) 117
algorithm design and analysis (116) 116
mathematical models (113) 113
coding and information theory (107) 107
multiplication (107) 107
access control (106) 106
biometrics (105) 105
engineering (105) 105
methods (105) 105
public key encryption (105) 105
ciphers (104) 104
images (104) 104
secure (102) 102
elliptic curve (101) 101
public key infrastructure (101) 101
internet (99) 99
communications engineering, networks (97) 97
entschlüsselung (96) 96
algorithm analysis and problem complexity (94) 94
identity-based cryptosystem (94) 94
attack (93) 93
セキュリティ (90) 90
asymmetric cryptosystem (89) 89
computer science, artificial intelligence (89) 89
system (89) 89
data structures, cryptology and information theory (88) 88
network security (86) 86
usage (86) 86
management of computing and information systems (85) 85
servers (85) 85
mceliece cryptosystem (83) 83
paillier cryptosystem (83) 83
combinatorics (82) 82
multivariate public key cryptosystem (80) 80
cryptography and security (79) 79
discrete logarithm (79) 79
公開 鍵 暗号 (79) 79
modular multiplication (78) 78
öffentlicher schlüssel (78) 78
efficient (77) 77
chaos theory (76) 76
homomorphic encryption (76) 76
kryptographie (76) 76
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Engineering & Comp. Sci. - Stacks (8) 8
Collection Dvlpm't (Acquisitions) - Vendor file (4) 4
Robarts - Stacks (4) 4
UofT at Mississauga - Stacks (3) 3
Mathematical Sciences - Stacks (2) 2
UofT at Scarborough - Stacks (2) 2
Gerstein Science - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (4876) 4876
Japanese (359) 359
Chinese (191) 191
Korean (24) 24
Spanish (5) 5
Czech (3) 3
French (3) 3
German (3) 3
Russian (3) 3
Croatian (2) 2
Polish (2) 2
Belarusian (1) 1
Lithuanian (1) 1
Portuguese (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE Transactions on Information Theory, ISSN 0018-9448, 01/2017, Volume 63, Issue 1, pp. 404 - 427
Journal Article
Journal of Theoretical and Applied Information Technology, ISSN 1992-8645, 10/2018, Volume 96, Issue 19, pp. 6474 - 6486
Journal Article
International Journal of Communication Systems, ISSN 1074-5351, 03/2019, Volume 32, Issue 4, p. n/a
Summary We propose a quantum ‐resistant key exchange protocol based on hard problems of lattices using MaTRU cryptosystem as an underlying scheme. A key... 
shortest vectors problem | closest vector problem | NTRU cryptosystem | lattice based cryptosystems | MaTRU cryptosystem | public key cryptosystems | DISCRETE LOGARITHMS | ALGORITHMS | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC | Exchanging | Storage area networks | Private networks | Trusted third parties | Lattices
Journal Article
Computing, ISSN 0010-485X, 2018, Volume 85, Issue 1-2, pp. 77 - 83
Journal Article
The Journal of Systems & Software, ISSN 0164-1212, 2011, Volume 84, Issue 11, pp. 1892 - 1898
Journal Article
Information Sciences, ISSN 0020-0255, 08/2017, Volume 396, pp. 97 - 113
•An image cipher using block-based scrambling and image filtering (IC-BSIF) is introduced;•It is the first time that image filtering is used to do... 
Image encryption | Block-based scrambling | Image filtering | Cryptosystem | CHAOTIC SYSTEM | COMPUTER SCIENCE, INFORMATION SYSTEMS | CRYPTANALYSIS | MAP | Information science
Journal Article
Information Fusion, ISSN 1566-2535, 07/2012, Volume 13, Issue 3, pp. 223 - 230
► An ID-based authentication scheme for mobile client-server environment is proposed. ► The scheme has better performance than the related schemes. ► A... 
Key agreement | Elliptic curve cryptosystem | Mutual authentication | ID-based | Perfect forward secrecy | Modular multiplication | EXCHANGE PROTOCOL | SENSOR NETWORKS | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | SCHEME | CRYPTOSYSTEMS | USER AUTHENTICATION | COMPUTER SCIENCE, THEORY & METHODS | BILINEAR PAIRINGS
Journal Article
by Xiong, Y and He, A and Quan, C
Optics Communications, ISSN 0030-4018, 12/2018, Volume 428, pp. 120 - 130
In this paper, the security of a nonlinear optical cryptosystem is evaluated. Compared with traditional cryptosystems based on phase-truncated Fourier... 
Nonlinear optical cryptosystem | Specific attack | PTFT | IMAGE ENCRYPTION ALGORITHM | GYRATOR DOMAINS | ASYMMETRIC CRYPTOSYSTEM | SECURITY ENHANCEMENT | RETRIEVAL ALGORITHM | CHOSEN-PLAINTEXT ATTACK | SCHEME | 2 RANDOM MASKS | FRESNEL DOMAIN | KEYS | OPTICS | Mechanical engineering | Analysis | Numerical analysis
Journal Article
Optics Communications, ISSN 0030-4018, 2012, Volume 285, Issue 6, pp. 1078 - 1081
We analyze the security of a recently proposed asymmetric cryptosystem that based on the phase-truncated Fourier transforms (PTFTs), and describe a specific... 
Amplitude retrieval | Asymmetric cryptosystem | Attack | DOMAIN | SECURITY SYSTEMS | PLANE | OPTICAL-IMAGE ENCRYPTION | ALGORITHM | KEYS | OPTICS | RETRIEVAL | PLAINTEXT ATTACK
Journal Article
Optics Communications, ISSN 0030-4018, 11/2015, Volume 354, pp. 344 - 352
In this paper, we propose a new optical information processing tool termed as gyrator wavelet transform to secure a fully phase image, based on amplitude- and... 
Gyrator wavelet transform | Image encryption | Image compression | Optical asymmetric cryptosystem | FUSION | FRACTIONAL FOURIER-TRANSFORMS | ALGORITHM | CRYPTOSYSTEM | COMPRESSION | OPTICS
Journal Article
Information Processing Letters, ISSN 0020-0190, 10/2012, Volume 112, Issue 19, pp. 753 - 758
Journal Article
Chaos, Solitons and Fractals, ISSN 0960-0779, 2009, Volume 40, Issue 5, pp. 2557 - 2568
Two pseudorandom binary sequence generators, based on logistic chaotic maps intended for stream cipher applications, are proposed. The first is based on a... 
SYNCHRONIZATION | SCHEME | MATHEMATICS, INTERDISCIPLINARY APPLICATIONS | PHYSICS, MULTIDISCIPLINARY | CRYPTOSYSTEM | PHYSICS, MATHEMATICAL | COMMUNICATION | CRYPTOGRAPHY | Statistics | Algorithms
Journal Article
International Journal of Bifurcation and Chaos, ISSN 0218-1274, 06/1998, Volume 8, Issue 6, pp. 1259 - 1284
In this paper, methods are shown how to adapt invertible two-dimensional chaotic maps on a torus or on a square to create new symmetric block encryption... 
CRYPTOSYSTEM | MATHEMATICS, INTERDISCIPLINARY APPLICATIONS | MULTIDISCIPLINARY SCIENCES
Journal Article
Signal Processing, ISSN 0165-1684, 2012, Volume 92, Issue 5, pp. 1202 - 1215
In recent years, a variety of chaos-based image cryptosystems have been proposed. Owing to the exceptionally desirable properties of mixing and sensitivity to... 
Piecewise nonlinear chaotic map | Image encryption | Entropy | Security | Cryptosystem | SCHEME | SEQUENCES | BAKER | HIERARCHY | ENGINEERING, ELECTRICAL & ELECTRONIC | Algorithms | Initial conditions | Chaos theory | Color | Images | Encryption | Computer information security
Journal Article
Chaos, Solitons and Fractals, ISSN 0960-0779, 2008, Volume 38, Issue 3, pp. 631 - 640
In recent years, the chaos-based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques, but the... 
MATHEMATICS, INTERDISCIPLINARY APPLICATIONS | PHYSICS, MULTIDISCIPLINARY | GENERALIZED SYNCHRONIZATION | DIMENSION | CRYPTOSYSTEM | SECURITY | PHYSICS, MATHEMATICAL | PERIODICITY
Journal Article
Optics Express, ISSN 1094-4087, 05/2011, Volume 19, Issue 11, pp. 10387 - 10409
A secure communication network with quantum key distribution in a metropolitan area is reported. Six different QKD systems are integrated into a mesh-type... 
CHANNEL | WAVELENGTH | CRYPTOSYSTEMS | INSTALLED TELECOM FIBER | SECURITY | DISTRIBUTION-SYSTEM | STATES ATTACK | TIME | OPTICS | EFFICIENCY | CRYPTOGRAPHY | Physics - Quantum Physics
Journal Article
Nature Photonics, ISSN 1749-4885, 10/2010, Volume 4, Issue 10, pp. 686 - 689
The peculiar properties of quantum mechanics allow two remote parties to communicate a private, secret key, which is protected from eavesdropping by the laws... 
Quantum mechanics | Detectors | Illumination | Patching | Photons | Photodiodes | Quantum cryptography | Eavesdropping
Journal Article