Skip to main menu
Scroll to content
PL
|
EN
Full-text resources of PSJD and other databases are now available in the new Library of Science.
Visit
https://bibliotekanauki.pl
Search
Browse
About
test
Refine search results
Journals
3
International Journal of Electronics and Telecommunications
1
Bulletin of the Polish Academy of Sciences: Technical Sciences
Years
1
2021
2
2020
1
2018
Authors
1
Algazy K. T.
1
Białas R.
1
Biyashev R. G.
1
Boryczka M.
1
Dyusenbayev D. S.
1
Grzonkowski M.
1
Kapalova N. A.
1
Polak I.
1
Premalatha J.
1
Rajasekar V.
1
Sathya K.
1
Smolarz A.
1
Wicik R.
1
Wojcik W.
Less...
More...
Preferences
Polski
English
Language
enabled
[disable]
Abstract
10
20
50
100
Number of results
Results found: 4
Number of results on page
10
20
50
100
Page
/ 1
Search results
Search:
in the keywords: cryptanalysis
Sort By:
accuracy
title
date descending
date ascending
journal title
author
Limit search:
in any field
in the title of publication
in the title of journal
among author
in the keywords
in references
Page
/ 1
1
Full text local access
Development and Analysis of Symmetric Encryption Algorithm Qamal Based on a Substitution-permutation Network
100%
Biyashev R. G.
,
Kapalova N. A.
,
Dyusenbayev D. S.
,
Algazy K. T.
,
Wojcik W.
,
Smolarz A.
,
Biyashev R. G.
,
Kapalova N. A.
,
Dyusenbayev D. S.
,
Algazy K. T.
,
Wojcik W.
,
Smolarz A.
International Journal of Electronics and Telecommunications
|
2021
|
vol.
67
|
issue
1
2
Full text local access
Cryptographic Protection for Military Radio Communications
100%
Białas R.
,
Grzonkowski M.
,
Wicik R.
,
Białas R.
,
Grzonkowski M.
,
Wicik R.
International Journal of Electronics and Telecommunications
|
2020
|
vol.
66
|
issue
4
3
Full text local access
Multi-factor signcryption scheme for secure authentication using hyper elliptic curve cryptography and bio-hash function
86%
Rajasekar V.
,
Premalatha J.
,
Sathya K.
,
Rajasekar V.
,
Premalatha J.
,
Sathya K.
Bulletin of the Polish Academy of Sciences: Technical Sciences
|
2020
|
issue
4
4
Full text local access
Tabu Search Against Permutation Based Stream Ciphers
72%
Polak I.
,
Boryczka M.
International Journal of Electronics and Telecommunications
|
2018
|
vol.
64
|
issue
2
Page
/ 1
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.