Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Cryptography“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Cryptography" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Cryptography"
Yan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)." Journal of Physics: Conference Series 2386, no. 1 (2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Der volle Inhalt der QuelleGoldreich, Oded. "Cryptography and cryptographic protocols." Distributed Computing 16, no. 2-3 (2003): 177–99. http://dx.doi.org/10.1007/s00446-002-0077-1.
Der volle Inhalt der QuelleAdeyemi Afolayan Adesola, Awele Mary-rose Ilusanmi, and Peter Chimee. "A review of the cryptographic approaches to data security: The impact of quantum computing, evolving challenges and future solutions." World Journal of Advanced Research and Reviews 25, no. 2 (2025): 1916–24. https://doi.org/10.30574/wjarr.2025.25.2.0434.
Der volle Inhalt der QuelleAnilkumar, Chunduru, Bhavani Gorle, and Kinthali Sowmya. "A Secure Method of Communication in Conventional Cryptography using Quantum Key Distribution." Applied and Computational Engineering 8, no. 1 (2023): 68–73. http://dx.doi.org/10.54254/2755-2721/8/20230083.
Der volle Inhalt der QuelleDonia Fadil Chalob, Rusul Hussein Hasan, and Suaad M. Saber. "A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis." International Journal of Scientific Research in Science, Engineering and Technology 12, no. 1 (2025): 275–82. https://doi.org/10.32628/ijsrset25121171.
Der volle Inhalt der QuellePasupuleti, Murali Krishna. "Post-Quantum Cryptography: Algorithms and Implementation Challenges." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 06 (2025): 234–43. https://doi.org/10.62311/nesx/rphcrcscrbc4.
Der volle Inhalt der QuelleBhoomika, P. Shetty, S. Darshan, B. R. Drakshayanamma, and Abdulhayan Sayed. "Review on Quantum Key Distribution." Journal of Optical Communication Electronics 5, no. 2 (2019): 1–4. https://doi.org/10.5281/zenodo.2656087.
Der volle Inhalt der QuelleWei, Yuchong. "A Survey of Lattice Cryptography." Applied and Computational Engineering 135, no. 1 (2025): 210–16. https://doi.org/10.54254/2755-2721/2025.21190.
Der volle Inhalt der QuellePasupuleti, Murali Krishna. "Algebraic Geometry Methods in Cryptographic Protocol Design." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 04 (2025): 296–304. https://doi.org/10.62311/nesx/rp2525.
Der volle Inhalt der QuelleRusetskaya, Irina A. "CRYPTOGRAPHY. FROM THE PAST TO THE FUTURE." RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, no. 4 (2021): 47–57. http://dx.doi.org/10.28995/2686-679x-2021-4-47-57.
Der volle Inhalt der QuelleDissertationen zum Thema "Cryptography"
Poschmann, Axel York. "Lightweight cryptography cryptographic engineering for a pervasive world." Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2009. http://d-nb.info/996578153/04.
Der volle Inhalt der QuelleAlmeida, Braga Daniel de. "Cryptography in the wild : the security of cryptographic implementations." Thesis, Rennes 1, 2022. http://www.theses.fr/2022REN1S067.
Der volle Inhalt der QuelleYerushalmi, Yoav. "Incremental cryptography." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42789.
Der volle Inhalt der QuelleShamonin, K. E. "Quantum cryptography." Thesis, Sumy State University, 2018. http://essuir.sumdu.edu.ua/handle/123456789/66837.
Der volle Inhalt der QuelleLopez, Samuel. "MODERN CRYPTOGRAPHY." CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/729.
Der volle Inhalt der QuelleMinaud, Brice. "Analyse de primitives cryptographiques récentes." Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1S066/document.
Der volle Inhalt der QuellePRIYADHARSHINI, THIRUTHUVADOSS ANGELINE. "Comparison and Performance Evaluation of Modern Cryptography and DNA Cryptography." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-120103.
Der volle Inhalt der QuelleNyman, Ellinor. "Cryptography : A study of modern cryptography and its mathematical methods." Thesis, Uppsala universitet, Analys och sannolikhetsteori, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-447460.
Der volle Inhalt der QuelleIdrees, Zunera. "Elliptic Curves Cryptography." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17544.
Der volle Inhalt der QuelleRoe, Michael Robert. "Cryptography and evidence." Thesis, University of Cambridge, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.627396.
Der volle Inhalt der QuelleBücher zum Thema "Cryptography"
Stinson, Douglas R., and Maura B. Paterson. Cryptography. Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9781315282497.
Der volle Inhalt der QuelleRubinstein-Salzedo, Simon. Cryptography. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94818-8.
Der volle Inhalt der QuelleSlayton, Rebecca, ed. Democratizing Cryptography. ACM, 2022. http://dx.doi.org/10.1145/3549993.
Der volle Inhalt der QuelleFranklin, Matthew, ed. Financial Cryptography. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48390-x.
Der volle Inhalt der QuelleOmondi, Amos R. Cryptography Arithmetic. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-34142-8.
Der volle Inhalt der QuelleEasttom, William. Modern Cryptography. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63115-4.
Der volle Inhalt der QuelleHirschfeld, Rafael, ed. Financial Cryptography. Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-63594-7.
Der volle Inhalt der QuelleHirchfeld, Rafael, ed. Financial Cryptography. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0055468.
Der volle Inhalt der QuelleFerguson, Niels, Bruce Schneier, and Tadayoshi Kohno. Cryptography Engineering. Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781118722367.
Der volle Inhalt der QuelleBlaze, Matt, ed. Financial Cryptography. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36504-4.
Der volle Inhalt der QuelleBuchteile zum Thema "Cryptography"
Hofheinz, Dennis, and Eike Kiltz. "Scalable Cryptography." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-21534-6_9.
Der volle Inhalt der QuelleBuchmann, Johannes. "Sustainable Cryptography." In International Symposium on Mathematics, Quantum Theory, and Cryptography. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5191-8_1.
Der volle Inhalt der QuelleHardy, Yorick, and Willi-Hans Steeb. "Cryptography." In Classical and Quantum Computing. Birkhäuser Basel, 2001. http://dx.doi.org/10.1007/978-3-0348-8366-5_11.
Der volle Inhalt der QuelleWallis, W. D. "Cryptography." In Mathematics in the Real World. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-8529-2_11.
Der volle Inhalt der QuelleO’Regan, Gerard. "Cryptography." In Texts in Computer Science. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44561-8_10.
Der volle Inhalt der QuelleKoblitz, Neal. "Cryptography." In Mathematics Unlimited — 2001 and Beyond. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/978-3-642-56478-9_38.
Der volle Inhalt der QuelleKizza, Joseph Migga. "Cryptography." In Guide to Computer Network Security. Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_11.
Der volle Inhalt der QuelleCorsini, Piergiulio, and Violeta Leoreanu. "Cryptography." In Applications of Hyperstructure Theory. Springer US, 2003. http://dx.doi.org/10.1007/978-1-4757-3714-1_8.
Der volle Inhalt der QuelleHansmann, Uwe, Martin S. Nicklous, Thomas Schäck, and Frank Seliger. "Cryptography." In Smart Card Application Development Using Java. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-642-98052-7_4.
Der volle Inhalt der QuelleNorberg, Scott. "Cryptography." In Advanced ASP.NET Core 3 Security. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6014-2_3.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Cryptography"
Singh, Pankaj, Ashutosh Srivastava, Divya Srivastava, Shivam, Madhushi Verma, and Vaishnavi Srivastava. "An Overview of Quantum Cryptography Evolution From Classical Cryptography." In 2025 International Conference on Cognitive Computing in Engineering, Communications, Sciences and Biomedical Health Informatics (IC3ECSBHI). IEEE, 2025. https://doi.org/10.1109/ic3ecsbhi63591.2025.10990566.
Der volle Inhalt der QuelleSeeburrun, Koshik, Karel Veerabudren, Mrinal Sharma, and Girish Bekaroo. "Demystifying Cryptography: An Experimental Study of Classical and Quantum Cryptography." In 2024 5th International Conference on Emerging Trends in Electrical, Electronic and Communications Engineering (ELECOM). IEEE, 2024. https://doi.org/10.1109/elecom63163.2024.10892169.
Der volle Inhalt der QuelleIshaq, Muhammad, and Bushra Al-Anesi. "Quantum Cryptography and Post-Quantum Security: Safeguarding Cryptographic Protocols Against Quantum Threats." In 2025 2nd International Conference on Advanced Innovations in Smart Cities (ICAISC). IEEE, 2025. https://doi.org/10.1109/icaisc64594.2025.10959635.
Der volle Inhalt der QuelleJovanović, Boriša, Ivan Tot, and Silvana Ilić. "Contemporary cryptography: Recent achievement and research perspectives." In 11th International Scientific Conference on Defensive Technologies - OTEX 2024. Military Technical Institute, Belgrade, 2024. http://dx.doi.org/10.5937/oteh24067j.
Der volle Inhalt der QuelleSlutsky, Boris A., R. Rao, L. Tancevski, P. C. Sun, and Y. Fainman. "Information Leakage Estimates in Quantum Cryptography." In Optics in Computing. Optica Publishing Group, 1997. http://dx.doi.org/10.1364/oc.1997.owc.2.
Der volle Inhalt der QuelleFaz-Hernández, Armando, and Julio López. "High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves." In Concurso de Teses e Dissertações. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/ctd.2023.230156.
Der volle Inhalt der QuelleFaz-Hernandez, Armando, and Julio López. "High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2024. http://dx.doi.org/10.5753/sbseg_estendido.2024.241959.
Der volle Inhalt der QuelleDuta, Cristinaloredana, and Laura Gheorghe. "ELEARNING FRAMEWORK FOR UNDERSTANDING CRYPTOGRAPHY AT ALL LEVELS." In eLSE 2015. Carol I National Defence University Publishing House, 2015. http://dx.doi.org/10.12753/2066-026x-15-026.
Der volle Inhalt der QuelleЛацин, Семен Михайлович, and Наталья Александровна Борсук. "ANALYSIS OF ELLIPTICAL CRYPTOGRAPHY ON THE EXAMPLE OF THE BITCOIN BLOCKCHAIN." In Методики фундаментальных и прикладных научных исследований: сборник статей всероссийской научной конференции (Санкт-Петербург, Декабрь 2022). Crossref, 2023. http://dx.doi.org/10.37539/221223.2022.83.11.008.
Der volle Inhalt der QuelleAXENTI, Ilie, and Olga CERBU. "Criptografia vizuală." In Materialele Conferinţei Ştiinţifice Internaţionale "Abordări inter/transdisciplinare în predarea ştiinţelor reale, (concept STEAM)". Ion Creangă Pedagogical State University, 2024. https://doi.org/10.46727/c.steam-2024.p249-253.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Cryptography"
Sonmez Turan, Meltem. Ascon-Based Lightweight Cryptography Standards for Constrained Devices. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.sp.800-232.
Der volle Inhalt der QuelleNechvatal, James. Public-key cryptography. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.sp.800-2.
Der volle Inhalt der Quellede Abreu, Jonas, and Mariana Cunha e Melo. Extending Pix: An approach to offline Dynamic QR Code generation. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/9qu6ex.
Der volle Inhalt der QuelleJonsson, J., and B. Kaliski. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3447.
Der volle Inhalt der QuelleMouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8319.
Der volle Inhalt der QuellePasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.
Der volle Inhalt der QuelleBlake-Wilson, S., D. Brown, and P. Lambert. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3278.
Der volle Inhalt der QuelleTurner, S., and D. Brown. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5753.
Der volle Inhalt der QuelleDraelos, Timothy John, Mark Dolan Torgerson, William Douglas Neumann, Donald R. Gallup, Michael Joseph Collins, and Cheryl Lynn Beaver. Hybrid cryptography key management. Office of Scientific and Technical Information (OSTI), 2003. http://dx.doi.org/10.2172/918318.
Der volle Inhalt der QuelleMcKay, Kerry A., Larry Bassham, Meltem Sonmez Turan, and Nicky Mouha. Report on lightweight cryptography. National Institute of Standards and Technology, 2017. http://dx.doi.org/10.6028/nist.ir.8114.
Der volle Inhalt der Quelle