Academic literature on the topic 'Advanced cryptographic techniques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Advanced cryptographic techniques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Advanced cryptographic techniques"
Abudalou, Mohammad. "Enhancing Data Security through Advanced Cryptographic Techniques." International Journal of Computer Science and Mobile Computing 13, no. 1 (2024): 88–92. http://dx.doi.org/10.47760/ijcsmc.2024.v13i01.007.
Full textKarantjias, Athanasios, and Nineta Polemi. "Assessment of advanced cryptographic antiviral techniques." International Journal of Electronic Security and Digital Forensics 3, no. 1 (2010): 60. http://dx.doi.org/10.1504/ijesdf.2010.032331.
Full textViresh, Kasheenath Babaleshwar, Karade Sinchana, N. Sakshi, and Naidu Anush. "Audio encryption and decryption using AES algorithm technique." i-manager’s Journal on Electronics Engineering 14, no. 2 (2024): 8. http://dx.doi.org/10.26634/jele.14.2.20486.
Full textLewis, Nehama, Yaron Connelly, Gil Henkin, Max Leibovich, and Adi Akavia. "Factors Influencing the Adoption of Advanced Cryptographic Techniques for Data Protection of Patient Medical Records." Healthcare Informatics Research 28, no. 2 (2022): 132–42. http://dx.doi.org/10.4258/hir.2022.28.2.132.
Full textHieu, Phan Duong, and Moti Yung. "PRIVACY IN ADVANCED CRYPTOGRAPHIC PROTOCOLS: PROTOTYPICAL EXAMPLES." Journal of Computer Science and Cybernetics 37, no. 4 (2021): 429–51. http://dx.doi.org/10.15625/1813-9663/37/4/16104.
Full textMalhotra, Anoushka, Ashwin Arora, and Dr Manjot Kaur Bhatia. "Symmetric Cryptographic Approaches." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (2022): 718–21. http://dx.doi.org/10.22214/ijraset.2022.47982.
Full textSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications." Mathematical Statistician and Engineering Applications 70, no. 1 (2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Full textMark Espalmado, John, and Edwin Arboleda. "DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (2017): 1032. http://dx.doi.org/10.11591/ijece.v7i2.pp1032-1041.
Full textFeilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense." Journal of Electrical Systems 19, no. 4 (2024): 227–40. http://dx.doi.org/10.52783/jes.635.
Full textParthasarathy, Rajamohan, Seow Soon Loong, and Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques." Journal of Engineering & Technological Advances 3, no. 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.
Full textDissertations / Theses on the topic "Advanced cryptographic techniques"
Ibarrondo, Luis Alberto. "Privacy-preserving biometric recognition systems with advanced cryptographic techniques." Electronic Thesis or Diss., Sorbonne université, 2023. https://theses.hal.science/tel-04058954.
Full textEscala, Ribas Alex. "Advanced cryptographic techniques for building verifiable and transparent electronic voting protocols." Doctoral thesis, Universitat Politècnica de Catalunya, 2017. http://hdl.handle.net/10803/457585.
Full textHartung, Gunnar Richard [Verfasser], and J. [Akademischer Betreuer] Müller-Quade. "Advanced Cryptographic Techniques for Protecting Log Data / Gunnar Richard Hartung ; Betreuer: J. Müller-Quade." Karlsruhe : KIT-Bibliothek, 2020. http://d-nb.info/1206646683/34.
Full textSantiago, Pinazo Sonia. "Advanced Features in Protocol Verification: Theory, Properties, and Efficiency in Maude-NPA." Doctoral thesis, Universitat Politècnica de València, 2015. http://hdl.handle.net/10251/48527.
Full textBozdemir, Beyza. "Privacy-preserving machine learning techniques." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS323.
Full textCapraro, Ivan. "Advanced Techniques in Free Space Quantum Communication." Doctoral thesis, Università degli studi di Padova, 2008. http://hdl.handle.net/11577/3425561.
Full textBooks on the topic "Advanced cryptographic techniques"
Swenson, Christopher. Modern cryptanalysis: Techniques for advanced code breaking. Wiley Pub., 2008.
Find full text1949-, Beth Thomas, Cot N. 1945-, and Ingemarsson I. 1938-, eds. Advances in cryptology: Proceedings of EUROCRYPT 84, a Workshop on the Theory and Application of Cryptographic Techniques, Paris, France, April 9-11, 1984. Springer-Verlag, 1985.
Find full textChristian, Cachin, and Camenisch Jan, eds. Advances in cryptology: EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004 : proceedings. Springer, 2004.
Find full textEUROCRYPT '94 (1994 Perugia, Italy). Advances in cryptology--EUROCRYPT-94: Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994 : proceedings. Springer-Verlag, 1995.
Find full text1945-, Quisquater J. J., and Guillou Louis C. 1947-, eds. Advances in cryptology, EUROCRYPT '95: International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995 : proceedings. Springer, 1995.
Find full textWatts, Davies Donald, ed. Advances in cryptology--EUROCRYPT '91: Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, April 8-11, 1991 : proceedings. Springer-Verlag, 1991.
Find full textEUROCRYPT, '88 (1988 Davos Switzerland). Advances in cryptology--EUROCRYPT '88: Workshop on the Theory and Application of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988 : proceedings. Springer-Verlag, 1988.
Find full textEUROCRYPT '92 (1992 Balatonfüred, Hungary). Advances in cryptology--EUROCRYPT '92: Workshop on the Theory and Application of Cryptographic Techniques, Balatonfüred, Hungary, May 24-28, 1992 : proceedings. Springer-Verlag, 1993.
Find full textAUSCRYPT '92 (1992 Gold Coast, Queensland, Australia). Advances in cryptology-AUSCRYPT '92: Workshop on the theory and application of cryptographic techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, proceedings. Springer-Verlag, 1993.
Find full textEUROCRYPT '96 (1996 Zaragoza, Spain). Advances in cryptology, EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996 : proceedings. Springer, 1996.
Find full textBook chapters on the topic "Advanced cryptographic techniques"
Kumar, J. Pradeep, P. Neelakanta Rao, and Neeraja koppula. "Secure Data Sharing in Images Using Cryptographic Approach." In Advanced Techniques for IoT Applications. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4435-1_34.
Full textGoh, Alwyn, and David C. L. Ngo. "Computation of Cryptographic Keys from Face Biometrics." In Communications and Multimedia Security. Advanced Techniques for Network and Data Protection. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45184-6_1.
Full textMohanta, Kshitish Kumar, Deena Sunil Sharanappa, and Vishnu Narayan Mishra. "Enhancing the security of public key cryptographic model based on integrated ElGamal-Elliptic Curve Diffe Hellman (EG-ECDH) key exchange technique." In Advanced Mathematical Techniques in Computational and Intelligent Systems. CRC Press, 2023. http://dx.doi.org/10.1201/9781003460169-6.
Full textLenin Solomon, A., and Narendran Rajagopalan. "Performance Analysis of Various Cryptographic Techniques." In Advances in Automation, Signal Processing, Instrumentation, and Control. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8221-9_156.
Full textSrivastava, Ananya, Aboli Khare, Priyaranjan Satapathy, and Ayes Chinmay. "Investigating Various Cryptographic Techniques Used in Cloud Computing." In Advances in Data Science and Management. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0978-0_26.
Full textArun, V., D. Laxma Reddy, and K. Nishanth Rao. "A Novel Analysis of Efficient Energy Architecture in Cryptography." In Advanced Techniques for IoT Applications. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4435-1_32.
Full textBasavaiah, Jagadeesh, Audre Arlene Anthony, and Chandrashekar Mohan Patil. "Visual Cryptography Using Hill Cipher and Advanced Hill Cipher Techniques." In Advances in VLSI, Signal Processing, Power Electronics, IoT, Communication and Embedded Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0443-0_34.
Full textSheikh, Shafiya Afzal, and M. Tariq Banday. "Secure E-mail Communications Through Cryptographic Techniques—A Study." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1275-9_19.
Full textFischer, Michael, and Rebecca Wright. "An application of game theoretic techniques to cryptography." In Advances in Computational Complexity Theory. American Mathematical Society, 1993. http://dx.doi.org/10.1090/dimacs/013/06.
Full textSathya Priya, J., V. Krithikaa, S. Monika, and P. Nivethini. "Ensuring Security in Sharing of Information Using Cryptographic Technique." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2182-5_3.
Full textConference papers on the topic "Advanced cryptographic techniques"
Ogiela, Marek R., Lidia Ogiela, and Urszula Ogiela. "Cryptographic Techniques in Advanced Information Management." In 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). IEEE, 2014. http://dx.doi.org/10.1109/imis.2014.31.
Full textOo, Bo Bo, and May Thu Aung. "Enhancing Secure Digital Communication Media Using Cryptographic Steganography Techniques." In 2020 International Conference on Advanced Information Technologies (ICAIT). IEEE, 2020. http://dx.doi.org/10.1109/icait51105.2020.9261790.
Full textOgiela, Lidia, and Marek R. Ogiela. "Bio-Inspired Cryptographic Techniques in Information Management Applications." In 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2016. http://dx.doi.org/10.1109/aina.2016.161.
Full textMihaljevic, Miodrag, Hideki Imai, Michael David, Kazukuni Kobara, and Hajime Watanabe. "On advanced cryptographic techniques for information security of smart grid AMI." In the Seventh Annual Workshop. ACM Press, 2011. http://dx.doi.org/10.1145/2179298.2179371.
Full textFaz-Hernández, Armando, and Julio López. "High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves." In Concurso de Teses e Dissertações. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/ctd.2023.230156.
Full textKumar, Vishal, Shafaque Ahmareen, Manoj Kumar, Yogendra Narayan Prajapati, Bhasker Pant, and Sneha Bohra. "Enhancing OTP Generation Efficiency through Cryptographic Techniques." In 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). IEEE, 2023. http://dx.doi.org/10.1109/icacite57410.2023.10182488.
Full textPateriya, Pushpendra Kumar, Mritunjay Rai, Krishna Prasad Mukherjee, and Gaurav Raj. "A Lightweight Cryptographic Algorithm using Trigonometric Technique." In 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE, 2018. http://dx.doi.org/10.1109/icacce.2018.8441670.
Full textSomaschi, Niccolo. "Semiconductor quantum dot based single-photon sources as resources for quantum communication and cryptography applications." In Advanced Photon Counting Techniques XVI, edited by Mark A. Itzler, K. Alex McIntosh, and Joshua C. Bienfang. SPIE, 2022. http://dx.doi.org/10.1117/12.2618464.
Full textHill, Alexander D., Bradley Christensen, and Paul G. Kwiat. "Advanced techniques for free-space optical quantum cryptography over water." In SPIE LASE, edited by Hamid Hemmati and Don M. Boroson. SPIE, 2016. http://dx.doi.org/10.1117/12.2218270.
Full textVaibhavi, Aher, and Kulkarni Samidha. "Cryptography Technique for Data Hiding Application." In 2016 Sixth International Conference on Advanced Computing & Communication Technologies. Research Publishing Services, 2016. http://dx.doi.org/10.3850/978-981-11-0783-2_420.
Full text