X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (3809) 3809
Conference Proceeding (1652) 1652
Book / eBook (406) 406
Book Chapter (256) 256
Publication (245) 245
Dissertation (85) 85
Government Document (16) 16
Paper (11) 11
Journal / eJournal (5) 5
Magazine Article (5) 5
Book Review (2) 2
Data Set (1) 1
Reference (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
cryptanalysis (4541) 4541
cryptography (1811) 1811
computer science (1011) 1011
security (936) 936
computer science, theory & methods (869) 869
computer science, information systems (863) 863
engineering, electrical & electronic (782) 782
encryption (775) 775
algorithms (697) 697
data encryption (680) 680
authentication (497) 497
cryptology (472) 472
block cipher (449) 449
computer communication networks (440) 440
analysis (439) 439
steganography (425) 425
telecommunications (414) 414
secret writing (409) 409
mathematics, applied (406) 406
differential cryptanalysis (387) 387
computer security (371) 371
mathematics (339) 339
verschlüsselung (323) 323
computer science, hardware & architecture (309) 309
scheme (303) 303
linear cryptanalysis (302) 302
ciphers (291) 291
computers (284) 284
criptografía (264) 264
computer science, software engineering (254) 254
image encryption (252) 252
algorithm analysis and problem complexity (251) 251
coding and information theory (251) 251
data structures, cryptology and information theory (248) 248
electronic books (245) 245
management of computing and information systems (245) 245
computer systems (237) 237
kryptologie (237) 237
chaos (234) 234
discrete mathematics in computer science (229) 229
stream cipher (229) 229
systems and data security (227) 227
algorithm (221) 221
security measures (217) 217
protection (215) 215
efficient (213) 213
smart cards (213) 213
smart card (207) 207
engineering (202) 202
computer information security (198) 198
improvement (197) 197
protocol (192) 192
data encoding (189) 189
encryption of data (189) 189
chaos theory (183) 183
aes (182) 182
computer privacy (182) 182
cyber security (182) 182
cybersecurity (182) 182
computer system security (179) 179
electronic digital computers (179) 179
permutation (179) 179
protection of computer systems (179) 179
security of computer systems (179) 179
communications engineering, networks (170) 170
cryptographie (170) 170
block ciphers (169) 169
physics, multidisciplinary (166) 166
multi-user (163) 163
images (161) 161
mathematical analysis (160) 160
attack (150) 150
cryptography and security (148) 148
privacy (148) 148
computer networks (143) 143
informatique (142) 142
information systems (141) 141
combinatorics (140) 140
congresses (137) 137
diffusion (137) 137
rsa (136) 136
attacks (135) 135
stream ciphers (135) 135
hash function (132) 132
kryptographie (132) 132
access control (131) 131
data security (129) 129
investment analysis (126) 126
methods (125) 125
data protection (124) 124
cryptography congresses (121) 121
password authentication (121) 121
authentifizierung (120) 120
kongress (120) 120
maps (118) 118
password (118) 118
coding theory (116) 116
complexity (116) 116
computer communication systems (116) 116
safety and security measures (116) 116
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Robarts - Stacks (61) 61
UofT at Mississauga - Stacks (54) 54
Engineering & Comp. Sci. - Stacks (43) 43
Mathematical Sciences - Stacks (30) 30
Trinity College (John W Graham) - Stacks (24) 24
UofT at Scarborough - Stacks (24) 24
Collection Dvlpm't (Acquisitions) - Vendor file (21) 21
Gerstein Science - Stacks (20) 20
St. Michael's College (John M. Kelly) - 2nd Floor (14) 14
UTL at Downsview - May be requested (10) 10
Collection Dvlpm't (Acquisitions) - Closed Orders (8) 8
Online Resources - Online (8) 8
Victoria University E.J. Pratt - Stacks (4) 4
Mathematical Sciences - Missing (3) 3
Engineering & Comp. Sci. - Missing (2) 2
Engineering & Comp. Sci. - Periodical Stacks (2) 2
Engineering & Comp. Sci. - May be requested in 6-10 wks (1) 1
Law (Bora Laskin) - Stacks (1) 1
Physics - Stacks (1) 1
Robarts - Not Returned (1) 1
Royal Ontario Museum - Stacks (1) 1
Thomas Fisher Rare Book - Rare Book (1) 1
Trinity College (John W Graham) - Storage (1) 1
University College (Laidlaw) - Stacks (1) 1
UofT Schools - Special Collections (1) 1
UofT Schools - Stacks (1) 1
UofT at Mississauga - Periodical Stacks (1) 1
UofT at Mississauga - Reference (1) 1
UofT at Scarborough - Circulation Desk (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (5574) 5574
Japanese (150) 150
Chinese (45) 45
Korean (22) 22
Spanish (18) 18
French (16) 16
German (11) 11
Russian (10) 10
Czech (5) 5
Portuguese (3) 3
Turkish (3) 3
Italian (2) 2
Arabic (1) 1
Latin (1) 1
Persian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE Transactions on Cybernetics, ISSN 2168-2267, 2018, Volume 48, Issue 4, pp. 1163 - 1175
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2010, Volume 6147, pp. 333 - 346
Conference Proceeding
International Journal of Computers and Applications, ISSN 1206-212X, 2018, pp. 1 - 19
Journal Article
Optics Express, ISSN 1094-4087, 11/2013, Volume 21, Issue 23, pp. 27873 - 27890
During the past decades, chaos-based permutation-diffusion type image cipher has been widely investigated to meet the increasing demand for real-time secure... 
CRYPTANALYSIS | OPTICS | ENCRYPTION SCHEME | ALGORITHM
Journal Article
Information Processing Letters, ISSN 0020-0190, 08/2018, Volume 136, pp. 5 - 8
We have analysed tweakable block cipher Scream which is used by cipher SCREAM, with the techniques linear cryptanalysis, differential cryptanalysis and related... 
Tweakable block cipher | Differential cryptanalysis | Related key cryptanalysis | Cryptography | Block cipher | Linear cryptanalysis | COMPUTER SCIENCE, INFORMATION SYSTEMS
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2014, Volume 8441, pp. 165 - 182
Conference Proceeding
Signal Processing, ISSN 0165-1684, 01/2016, Volume 118, pp. 203 - 210
In year 2000, an efficient hierarchical chaotic image encryption (HCIE) algorithm was proposed, which divides a plain-image of size M×N with T possible value... 
Histogram | Permutation | Known-plaintext attack | Chosen-plaintext attack | Chaotic cryptanalysis | ONLY MULTIMEDIA CIPHERS | SCHEME | PLAINTEXT ATTACKS | SECURITY | QUANTITATIVE CRYPTANALYSIS | ENGINEERING, ELECTRICAL & ELECTRONIC | Analysis | Algorithms | Computer Science - Cryptography and Security
Journal Article
Beijing Daxue Xuebao (Ziran Kexue Ban)/Acta Scientiarum Naturalium Universitatis Pekinensis, ISSN 0479-8023, 11/2018, Volume 54, Issue 6, pp. 1173 - 1178
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2014, Volume 8651, pp. 90 - 107
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2016, Volume 9836, pp. 147 - 163
Journal Article
2005, ISBN 0131828312, xiv, 285
Book
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2006, Volume 3960, pp. 1 - 20
Journal Article
SCIENTIFIC REPORTS, ISSN 2045-2322, 05/2019, Volume 9, Issue 1, p. 7626
Sealed-bid auction is an important tool in modern economic especially concerned with networks. However, the bidders still lack the privacy protection in... 
IMPROVEMENT | PROTOCOL | CRYPTANALYSIS | MULTIDISCIPLINARY SCIENCES
Journal Article
Computing, ISSN 0010-485X, 2018, Volume 85, Issue 1-2, pp. 77 - 83
Journal Article
Signal Processing, ISSN 0165-1684, 05/2018, Volume 146, pp. 22 - 32
•Zhou et al. Encryption Scheme is practically infeasible for use in native form.•Practically feasible solution found weak against attack.•Successfully... 
Chaos | Cryptanalysis | Image encryption | Permutation-substitution architecture | ALGORITHM | QUANTITATIVE CRYPTANALYSIS | PERMUTATION | BIT | ENGINEERING, ELECTRICAL & ELECTRONIC | ONLY MULTIMEDIA CIPHERS | SCRAMBLING ENCRYPTION | SECURITY ANALYSIS | EFFICIENT
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 01/2017, Volume 10159, pp. 3 - 18
Journal Article
Information Processing Letters, ISSN 0020-0190, 04/2020, Volume 156, p. 105902
•Integral Property of the permutation in GOST R hash function.•Distinguishing attack on the full-round compression function of GOST R.•Known-key distinguisher... 
Integral cryptanalysis | (known-key) distinguisher | GOST R
Journal Article
Advances in Intelligent Systems and Computing, ISSN 2194-5357, 2019, Volume 769, pp. 232 - 242
Conference Proceeding
International Journal of Embedded Systems, ISSN 1741-1068, 2018, Volume 10, Issue 3, pp. 196 - 202
Simon is a family of lightweight block ciphers designed by the U.S National Security Agency in 2013. Simon 2n/k is a cipher in this family with k-bit key and... 
Differential cryptanalysis | Simon block cipher | Differential-linear cryptanalysis | Linear cryptanalysis | Cryptography | Algorithms | Encryption
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.