Search Results
- Articles
- Books & Media
- Our Website
- Collection Guides
- Archival Materials
ArticlesSee all articles results »
From journals and magazines
-
A new public key cryptography using generalized Fibonacci matrices A new public key (...)
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwED4hJhgQL4m3bmCNWjuOk0pVpVI1AiQGHhIwRfbVaTOAqrYM8Df4w5zjCGVjoEsGD7Z8urvvO_nyHcCl9fNsOW4iqxUXKEJzSHVJRAwmnCdVQor8v8PP2e2rvH_I8lFr1JfvCQvywMFwnZgy56QTWpZM5kXPJKq0sZDkrNVZWvrsy1V5q5hiT1KKY1x4oA05WbPf1u_LmYqjVHokaSn011CS78JOwwFxGM7egw33vg_bd78CqssD-B4i813szwZBhxo51pAWn_NVIzHd78wG6JvWpzgNytHVl5tgXlmm1kQVvtXa-26Ja9vpEG7y8dPoOvJ3KuZBpqLwwtH1ApuzaMxZ_GXO-AgwZY5idGIsefAnaUvjqLQmTcVEUtccw9X_DzpZxyansCWZZIT2kjPYXC0-3HkY63BROwR_x48vP5YjxVI
Surveys In Mathematics And Its Applications, Volume 19 (2024), pp. 301 - 316
Journal Article : Full Text Online
-
A biometrics-generated private/public key cryptography for a blockchain-based e-voting (...)
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwvV3LSsRQDA3iShfiC3yThdtL53b6EoaBmcGi7hRBXJX7qgVBSx0FP9G_Mrm3MN25UNx20UBock5ocg7AuWY_W6obobOEBhSZUUmNjBQEJtQnk9Qkhm-HH4qbx_j2rigXA6sv3gkL8sAhcRH1ziI1xAtsqglsapVYe5GP2azSSZX4O3KaygfDVOjBkv_oeWcVajQs6rYS5Y979Ci3YaunfTgL4XZgzb3swuZADHAPvmbob-FZMv9NPHk5aKKD2HZsQOaiSTMNmtRIdYem-2yXvdz0JGqmSOQTFWrCpmfT0LgvGJ8sOvHxypvNGCSb8T-C7MN1eXm_uBKciaoNehYVK0z7B5T3qs979VPexweAOZEZlaVKG2YJJta1cqbWKs-ljc1IHcL894GO_uIlx7ARExsJy2MnsL7s3t1p8H8481_ONyUu0w0
Egyptian Informatics Journal, Volume 25, p. 100447
Journal Article : Full Text Online
-
Quantum computing and the security of public key cryptography Quantum computing and the (...)
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NS8NAEB3EkxexKvjNHDzoITTZfBZKoRaDeqsI4ilsJhuKoJa2OfgT_NfO7G6hNw_2msMuO-Ttm7fZvAdwXUueLeMmqLOEBUqUMaRCigImE94nk5QSkn-HX4unNzV9LsrJRtSX3Alz9sCucP0B9-umiEMSHxaxGmlSQyYlyptMhxHJ7suqfENMvdsjo4jFl3xCYAJiFCmJdF-b8seePcoD2PdtH47ddD3YMZ-H0PPAWuKNd3--PYKfaceL7T6QbN4CMwuy2Efu03Dps-bwq8XhbOQcqpFRiLT4nq-8-fSwPxvhNgY5hsfy_mXyEMiCqrmzpajEKNo-4PJVvnzVX-WLTwBz7kl0luqahOxJ1a021NY6z6NGUahP4e7_E51tY5Bz2FNyp8QegVzA7mrRmUsX43BlX4BfMLm-fA
Fundamental Research (Beijing), Volume 1, Issue 1, pp. 85 - 87
Journal Article : Full Text Online
Books & MediaSee all books & media results »
Books, music, movies and more
-
Public-key cryptography
https://find.library.duke.edu/catalog/DUKE001760436
Book, Government publication
Check Holdings for this item's availability Perkins Public Documents/Maps, C 13.10:800-2
-
Public-key cryptography
https://find.library.duke.edu/catalog/DUKE000983604
Book
Check Holdings for this item's availability Perkins & Bostock Library, QA76.9.A25 S26 1990
-
Public-key cryptography
https://find.library.duke.edu/catalog/UNCb10688101
Book, Government publication : View Online
Collection Guides
Detailed inventories of archival collections
Some materials and descriptions may include offensive content. More info