ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1301.0313
  4. Cited By
The Piggy Bank Cryptographic Trope

The Piggy Bank Cryptographic Trope

1 January 2013
S. Kak
ArXiv (abs)PDFHTML

Papers citing "The Piggy Bank Cryptographic Trope"

16 / 16 papers shown
Secret Sharing With Trusted Third Parties Using Piggy Bank Protocol
Secret Sharing With Trusted Third Parties Using Piggy Bank Protocol
Adnan Memon
62
0
0
17 Aug 2016
The Narayana Universal Code
The Narayana Universal Code
K. Kirthi
S. Kak
65
3
0
26 Jan 2016
Narayana Sequences for Cryptographic Applications
Narayana Sequences for Cryptographic Applications
K. Kirthi
261
0
0
17 Sep 2015
Coding Side-Information for Implementing Cubic Transformation
Coding Side-Information for Implementing Cubic Transformation
B. P. Reddy
78
0
0
15 Jun 2015
Multiparty Probability Computation and Verification
Multiparty Probability Computation and Verification
S. Kak
76
2
0
19 May 2015
Generating Primes Using Partitions
Generating Primes Using Partitions
Ganesh Reddy Pittu
51
3
0
01 May 2015
A Review of Man-in-the-Middle Attacks
A Review of Man-in-the-Middle Attacks
Subodh Gangan
112
44
0
08 Apr 2015
A Survey of P2P Network Security
A Survey of P2P Network Security
Logan Washbourne
74
26
0
06 Apr 2015
Authentication Using Piggy Bank Approach to Secure Double-Lock
  Cryptography
Authentication Using Piggy Bank Approach to Secure Double-Lock Cryptography
S. Kak
75
6
0
13 Nov 2014
A Piggybank Protocol for Quantum Cryptography
A Piggybank Protocol for Quantum Cryptography
Navya Chodisetti
113
2
0
09 Jun 2014
Survey of Key Distribution Schemes for Wireless Sensor Networks
Survey of Key Distribution Schemes for Wireless Sensor Networks
Pratik P. Chaphekar
117
2
0
16 May 2014
Analysis of Digital Knapsack Based Sealed Bid Auction
Analysis of Digital Knapsack Based Sealed Bid Auction
Navya Chodisetti
123
0
0
01 May 2014
Generalized Public Key Transformations with Side Information
Generalized Public Key Transformations with Side Information
Gunjan Talati
S. Kak
83
1
0
17 Apr 2013
The Quartic Public Key Transformation
The Quartic Public Key Transformation
Gunjan Talati
S. Kak
99
1
0
15 Apr 2013
Intensity and State Estimation in Quantum Cryptography
Intensity and State Estimation in Quantum Cryptography
S. Chitikela
172
2
0
07 Feb 2013
Generating target probability sequences and events
Generating target probability sequences and events
V. S. Ella
126
0
0
06 Feb 2013
1
Page 1 of 1