Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Microsoft CryptoAPI

Known as: Cryptographic API, CryptoAPI (Windows), Cryptographic Application Programming Interface 
The Microsoft windows platform specific Cryptographic Application Programming Interface (also known variously as CryptoAPI, Microsoft Cryptography… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
HACL* is a verified portable C cryptographic library that implements modern cryptographic primitives such as the ChaCha20 and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2016
2016
A systolic array is known as a parallel hardware architecture applicable to a wide range of applications. Naive implementations… Expand
  • figure 4
  • figure 1
  • figure 2
  • table 2
Is this relevant?
Highly Cited
2015
Highly Cited
2015
Heterogeneous computing systems combine different types of compute elements that share memory. A specific class of heterogeneous… Expand
Is this relevant?
2011
2011
This paper discusses how cryptography is misused in the security design of a large part of the Web. Our focus is on ASP.NET, the… Expand
  • figure 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We describe an interview-based data-collection procedure for social network analysis designed to aid gathering information about… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • figure 1
Is this relevant?
2007
2007
Abstract The reliability of self-reports of sexual acts and sexually transmitted disease symptoms was compared among 199 food… Expand
Is this relevant?
2005
2005
Practitioners who conduct assessments of parenting capacity for the courts are faced with the challenge of determining the extent… Expand
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2005
2003
2003
The focus of Computer-Aided Plant-Identification (CAPI) is the stable features extraction of plant, such as sawtooth number of… Expand
Is this relevant?
Highly Cited
1996
Highly Cited
1996
This study compared three methods of collecting sur- vey data about sexual behaviors and other sensitive topics: com- puter… Expand
  • table 2
  • table 3
  • table 4
  • table 5
  • figure 4
Is this relevant?