Keywords:
Computer science

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
0.26
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Cryptographic Implementations and Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition

Related Documents

JOURNAL ARTICLE

End-to-End Encryption

Benjamin Aleshire

Journal:   Pleiades Year: 2024 Vol: 44 (1)Pages: 285-285
JOURNAL ARTICLE

End-to-end encryption

Elizaveta Sergeevna Mazunina

Journal:   Academic community of students Year: 2016 Pages: 48-50
JOURNAL ARTICLE

Subverting Telegram’s End-to-End Encryption

Benoît CogliatiJordan EthanAshwin Jha

Journal:   IACR Transactions on Symmetric Cryptology Year: 2023 Pages: 5-40
JOURNAL ARTICLE

Subverting Telegram's End-to-End Encryption

Cogliati, Benoît-MichelEthan, JordanJha, Ashwin

Journal:   CISPA Helmholtz Center Year: 2023
JOURNAL ARTICLE

Subverting Telegram's End-to-End Encryption

Cogliati, Benoît-MichelEthan, JordanJha, Ashwin

Journal:   CISPA Helmholtz Center Year: 2023
© 2026 ScienceGate Book Chapters — All rights reserved.