Academic literature on the topic 'Advanced cryptographic techniques'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Advanced cryptographic techniques.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Advanced cryptographic techniques"

1

Abudalou, Mohammad. "Enhancing Data Security through Advanced Cryptographic Techniques." International Journal of Computer Science and Mobile Computing 13, no. 1 (2024): 88–92. http://dx.doi.org/10.47760/ijcsmc.2024.v13i01.007.

Full text
Abstract:
In a time when digital technology is everywhere, it is essential to have strong data security, This study addresses data security, focusing on advanced encryption methods, A secure connection, or encryption, protects private data from tampering and unauthorized access, The research explores modern cryptographic technologies, including blockchain-based solutions, quantum-resistant algorithms, and homomorphic cryptography, These evolving approaches provide increased defense against changing cyber threats, The study examines the theoretical foundations, real-world applications, and potential impa
APA, Harvard, Vancouver, ISO, and other styles
2

Karantjias, Athanasios, and Nineta Polemi. "Assessment of advanced cryptographic antiviral techniques." International Journal of Electronic Security and Digital Forensics 3, no. 1 (2010): 60. http://dx.doi.org/10.1504/ijesdf.2010.032331.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Viresh, Kasheenath Babaleshwar, Karade Sinchana, N. Sakshi, and Naidu Anush. "Audio encryption and decryption using AES algorithm technique." i-manager’s Journal on Electronics Engineering 14, no. 2 (2024): 8. http://dx.doi.org/10.26634/jele.14.2.20486.

Full text
Abstract:
Audio cryptography is the practice of encrypting audio data to prevent illegal access to and listening to it. This paper presents an innovative technique of audio cryptography based on the Python computer language. To ensure secrecy and integrity, the suggested system encrypts and decrypts audio signals using advanced cryptographic techniques. A crucial component of AES, the cryptographic key is dynamically created to improve security. Python's broad library support and ease of use make it an ideal platform for implementing the AES algorithm, which ensures dependable and effective audio data e
APA, Harvard, Vancouver, ISO, and other styles
4

Lewis, Nehama, Yaron Connelly, Gil Henkin, Max Leibovich, and Adi Akavia. "Factors Influencing the Adoption of Advanced Cryptographic Techniques for Data Protection of Patient Medical Records." Healthcare Informatics Research 28, no. 2 (2022): 132–42. http://dx.doi.org/10.4258/hir.2022.28.2.132.

Full text
Abstract:
Objectives: Healthcare organizations that maintain and process Electronic Medical Records are at risk of cyber-attacks, which can lead to breaches of confidentiality, financial harm, and possible interference with medical care. State-of-the-art methods in cryptography have the potential to offer improved security of medical records; nonetheless, healthcare providers may be reluctant to adopt and implement them. The objectives of this study were to assess current data management and security procedures; to identify attitudes, knowledge, perceived norms, and self-efficacy regarding the adoption
APA, Harvard, Vancouver, ISO, and other styles
5

Hieu, Phan Duong, and Moti Yung. "PRIVACY IN ADVANCED CRYPTOGRAPHIC PROTOCOLS: PROTOTYPICAL EXAMPLES." Journal of Computer Science and Cybernetics 37, no. 4 (2021): 429–51. http://dx.doi.org/10.15625/1813-9663/37/4/16104.

Full text
Abstract:
Cryptography is the fundamental cornerstone of cybersecurity employed for achieving data confidentiality, integrity, and authenticity. However, when cryptographic protocols are deployed for emerging applications such as cloud services or big data, the demand for security grows beyond these basic requirements. Data nowadays are being extensively stored in the cloud, users also need to trust the cloud servers/authorities that run powerful applications. Collecting user data, combined with powerful machine learning tools, can come with a huge risk of mass surveillance or undesirable data-driven st
APA, Harvard, Vancouver, ISO, and other styles
6

Malhotra, Anoushka, Ashwin Arora, and Dr Manjot Kaur Bhatia. "Symmetric Cryptographic Approaches." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (2022): 718–21. http://dx.doi.org/10.22214/ijraset.2022.47982.

Full text
Abstract:
Abstract: In recent decades, information security has become a major concern. They have recently been intensively investigated and developed because they need more encryption and decryption and are tough to breach. These constraints need the use of encryption. In recent years, several academics have developed numerous encryption algorithms, such as AES, DES, 3DES, RC4 Algorithm, Blowfish Algorithm, and others. Data encryption techniques have advanced from relatively easy routes to quite hard mathematical calculations to guarantee excellent communication security. This study compares and contra
APA, Harvard, Vancouver, ISO, and other styles
7

Singh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications." Mathematical Statistician and Engineering Applications 70, no. 1 (2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.

Full text
Abstract:
In many applications, secure communication and data privacy are crucially supported by cryptography. The study of cryptography is now essential for creating strong and dependable security systems due to the growing risks to sensitive information in the digital era. The fundamentals of cryptography, its guiding principles, and its useful applications in securing communication channels and preserving data privacy are explored in this research article.Beginning with symmetric and asymmetric encryption techniques, the inquiry first looks at the fundamental ideas of encryption and decryption. It ex
APA, Harvard, Vancouver, ISO, and other styles
8

Mark Espalmado, John, and Edwin Arboleda. "DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (2017): 1032. http://dx.doi.org/10.11591/ijece.v7i2.pp1032-1041.

Full text
Abstract:
Exchange of information between computer networks requires a secure communications channel to prevent and monitor unauthorized access, modification and denial of the computer network. To address this growing problem, security experts sought ways to advance the integrity of data transmission. Security Attacks compromises the security and hence hybrid cryptographic algorithms have been proposed to achieve safe service in the proper manner, such as user authentication and data confidentiality. Data security and authenticity are achieved using these algorithms. Moreover, to improve the strength an
APA, Harvard, Vancouver, ISO, and other styles
9

Feilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense." Journal of Electrical Systems 19, no. 4 (2024): 227–40. http://dx.doi.org/10.52783/jes.635.

Full text
Abstract:
In an increasingly interconnected world, the convergence of power system networks and biometric-based biomedical applications presents unique challenges for data protection and privacy. This research endeavors to conceptualize and design an intelligent countermeasure system that serves as a robust defense mechanism for enhancing security in this complex ecosystem. The proposed system incorporates biometric authentication techniques to fortify user access controls, implements advanced encryption methods for safeguarding sensitive biomedical data, and intrusion detection and prevention mechanism
APA, Harvard, Vancouver, ISO, and other styles
10

Parthasarathy, Rajamohan, Seow Soon Loong, and Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques." Journal of Engineering & Technological Advances 3, no. 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.

Full text
Abstract:
The AES algorithm is a symmetric block cipher that can encrypt, (encipher), and decrypt, (decipher), information. Encryption converts data to an unintelligible form called cipher-text. Decryption of the cipher-text converts the data back into its original form, which is called plaintext. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits. The National Institute of Standards and Technology, (NIST), solicited proposals for the Advanced Encryption Standard, (AES). The AES is a Federal Information Processing Standard
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Advanced cryptographic techniques"

1

Ibarrondo, Luis Alberto. "Privacy-preserving biometric recognition systems with advanced cryptographic techniques." Electronic Thesis or Diss., Sorbonne université, 2023. https://theses.hal.science/tel-04058954.

Full text
Abstract:
Traitant des données très sensibles, les systèmes de gestion d'identité doivent fournir une protection adéquate de la confidentialité. En utilisant le calcul multipartite (MPC), le chiffrement homomorphe (HE) et le chiffrement fonctionnel (FE), cette thèse aborde la conception et la mise en œuvre de systèmes biométriques préservant la confidentialité pour de multiples scénarios. Nous améliorons les travaux existants dans le domaine, en équilibrant la précision et la performance avec les garanties de sécurité. Nous allons au-delà des adversaires semi-honnêtes pour garantir la correction face au
APA, Harvard, Vancouver, ISO, and other styles
2

Escala, Ribas Alex. "Advanced cryptographic techniques for building verifiable and transparent electronic voting protocols." Doctoral thesis, Universitat Politècnica de Catalunya, 2017. http://hdl.handle.net/10803/457585.

Full text
Abstract:
Electronic voting presents many challenges due to its multiple security requirements. Some of the challenges are related to guaranteeing voters' privacy and system's transparency, which are hard to satisfy simultaneously. Electronic voting also presents other challenges such as usability, particularly from the voter's side. We study two particular problems of electronic voting. Cast-as-intended verifiability comprises those mechanisms which assure the voter that her cast ballot corresponds to her chosen voting options. Current proposals put the verification burden on the voter, something w
APA, Harvard, Vancouver, ISO, and other styles
3

Hartung, Gunnar Richard [Verfasser], and J. [Akademischer Betreuer] Müller-Quade. "Advanced Cryptographic Techniques for Protecting Log Data / Gunnar Richard Hartung ; Betreuer: J. Müller-Quade." Karlsruhe : KIT-Bibliothek, 2020. http://d-nb.info/1206646683/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Santiago, Pinazo Sonia. "Advanced Features in Protocol Verification: Theory, Properties, and Efficiency in Maude-NPA." Doctoral thesis, Universitat Politècnica de València, 2015. http://hdl.handle.net/10251/48527.

Full text
Abstract:
The area of formal analysis of cryptographic protocols has been an active one since the mid 80’s. The idea is to verify communication protocols that use encryption to guarantee secrecy and that use authentication of data to ensure security. Formal methods are used in protocol analysis to provide formal proofs of security, and to uncover bugs and security flaws that in some cases had remained unknown long after the original protocol publication, such as the case of the well known Needham-Schroeder Public Key (NSPK) protocol. In this thesis we tackle problems regarding the three main pil
APA, Harvard, Vancouver, ISO, and other styles
5

Bozdemir, Beyza. "Privacy-preserving machine learning techniques." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS323.

Full text
Abstract:
L'apprentissage automatique en tant que service (MLaaS) fait référence à un service qui permet aux entreprises de déléguer leurs tâches d'apprentissage automatique à un ou plusieurs serveurs puissants, à savoir des serveurs cloud. Néanmoins, les entreprises sont confrontées à des défis importants pour garantir la confidentialité des données et le respect des réglementations en matière de protection des données. L'exécution de tâches d'apprentissage automatique sur des données sensibles nécessite la conception de nouveaux protocoles garantissant la confidentialité des données pour les technique
APA, Harvard, Vancouver, ISO, and other styles
6

Capraro, Ivan. "Advanced Techniques in Free Space Quantum Communication." Doctoral thesis, Università degli studi di Padova, 2008. http://hdl.handle.net/11577/3425561.

Full text
Abstract:
The main argument of this thesis is the application of advanced techniques for the optimization of single photon communication and in general of single photon applications. The work is inserted in the contest of various projects that involve the departments of Information Engineering and Astronomy of the University of Padua. In particular my contribution has been the development of a quantum cryptography setup that we called QuAKE. The system has been designed and implemented in our labs and include in the hardware some advanced temporal and spatial filtering techniques. These features has b
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Advanced cryptographic techniques"

1

Swenson, Christopher. Modern cryptanalysis: Techniques for advanced code breaking. Wiley Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1949-, Beth Thomas, Cot N. 1945-, and Ingemarsson I. 1938-, eds. Advances in cryptology: Proceedings of EUROCRYPT 84, a Workshop on the Theory and Application of Cryptographic Techniques, Paris, France, April 9-11, 1984. Springer-Verlag, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Christian, Cachin, and Camenisch Jan, eds. Advances in cryptology: EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004 : proceedings. Springer, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

EUROCRYPT '94 (1994 Perugia, Italy). Advances in cryptology--EUROCRYPT-94: Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994 : proceedings. Springer-Verlag, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

1945-, Quisquater J. J., and Guillou Louis C. 1947-, eds. Advances in cryptology, EUROCRYPT '95: International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995 : proceedings. Springer, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Watts, Davies Donald, ed. Advances in cryptology--EUROCRYPT '91: Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, April 8-11, 1991 : proceedings. Springer-Verlag, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

EUROCRYPT, '88 (1988 Davos Switzerland). Advances in cryptology--EUROCRYPT '88: Workshop on the Theory and Application of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988 : proceedings. Springer-Verlag, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

EUROCRYPT '92 (1992 Balatonfüred, Hungary). Advances in cryptology--EUROCRYPT '92: Workshop on the Theory and Application of Cryptographic Techniques, Balatonfüred, Hungary, May 24-28, 1992 : proceedings. Springer-Verlag, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

AUSCRYPT '92 (1992 Gold Coast, Queensland, Australia). Advances in cryptology-AUSCRYPT '92: Workshop on the theory and application of cryptographic techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, proceedings. Springer-Verlag, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

EUROCRYPT '96 (1996 Zaragoza, Spain). Advances in cryptology, EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996 : proceedings. Springer, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Advanced cryptographic techniques"

1

Kumar, J. Pradeep, P. Neelakanta Rao, and Neeraja koppula. "Secure Data Sharing in Images Using Cryptographic Approach." In Advanced Techniques for IoT Applications. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4435-1_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Goh, Alwyn, and David C. L. Ngo. "Computation of Cryptographic Keys from Face Biometrics." In Communications and Multimedia Security. Advanced Techniques for Network and Data Protection. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45184-6_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mohanta, Kshitish Kumar, Deena Sunil Sharanappa, and Vishnu Narayan Mishra. "Enhancing the security of public key cryptographic model based on integrated ElGamal-Elliptic Curve Diffe Hellman (EG-ECDH) key exchange technique." In Advanced Mathematical Techniques in Computational and Intelligent Systems. CRC Press, 2023. http://dx.doi.org/10.1201/9781003460169-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lenin Solomon, A., and Narendran Rajagopalan. "Performance Analysis of Various Cryptographic Techniques." In Advances in Automation, Signal Processing, Instrumentation, and Control. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8221-9_156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Srivastava, Ananya, Aboli Khare, Priyaranjan Satapathy, and Ayes Chinmay. "Investigating Various Cryptographic Techniques Used in Cloud Computing." In Advances in Data Science and Management. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0978-0_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Arun, V., D. Laxma Reddy, and K. Nishanth Rao. "A Novel Analysis of Efficient Energy Architecture in Cryptography." In Advanced Techniques for IoT Applications. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4435-1_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Basavaiah, Jagadeesh, Audre Arlene Anthony, and Chandrashekar Mohan Patil. "Visual Cryptography Using Hill Cipher and Advanced Hill Cipher Techniques." In Advances in VLSI, Signal Processing, Power Electronics, IoT, Communication and Embedded Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0443-0_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sheikh, Shafiya Afzal, and M. Tariq Banday. "Secure E-mail Communications Through Cryptographic Techniques—A Study." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1275-9_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fischer, Michael, and Rebecca Wright. "An application of game theoretic techniques to cryptography." In Advances in Computational Complexity Theory. American Mathematical Society, 1993. http://dx.doi.org/10.1090/dimacs/013/06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sathya Priya, J., V. Krithikaa, S. Monika, and P. Nivethini. "Ensuring Security in Sharing of Information Using Cryptographic Technique." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2182-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Advanced cryptographic techniques"

1

Ogiela, Marek R., Lidia Ogiela, and Urszula Ogiela. "Cryptographic Techniques in Advanced Information Management." In 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). IEEE, 2014. http://dx.doi.org/10.1109/imis.2014.31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Oo, Bo Bo, and May Thu Aung. "Enhancing Secure Digital Communication Media Using Cryptographic Steganography Techniques." In 2020 International Conference on Advanced Information Technologies (ICAIT). IEEE, 2020. http://dx.doi.org/10.1109/icait51105.2020.9261790.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ogiela, Lidia, and Marek R. Ogiela. "Bio-Inspired Cryptographic Techniques in Information Management Applications." In 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2016. http://dx.doi.org/10.1109/aina.2016.161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mihaljevic, Miodrag, Hideki Imai, Michael David, Kazukuni Kobara, and Hajime Watanabe. "On advanced cryptographic techniques for information security of smart grid AMI." In the Seventh Annual Workshop. ACM Press, 2011. http://dx.doi.org/10.1145/2179298.2179371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Faz-Hernández, Armando, and Julio López. "High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves." In Concurso de Teses e Dissertações. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/ctd.2023.230156.

Full text
Abstract:
Cryptography based on elliptic curves is endowed with efficient methods for public-key cryptography. Recent research has shown the superiority of the Montgomery and Edwards curves over the Weierstrass curves as they require fewer arithmetic operations. Using these modern curves has, however, introduced several challenges to the cryptographic algorithm’s design, opening up new opportunities for optimization. Our main objective is to propose algorithmic optimizations and implementation techniques for cryptographic algorithms based on elliptic curves. In order to speed up the execution of these a
APA, Harvard, Vancouver, ISO, and other styles
6

Kumar, Vishal, Shafaque Ahmareen, Manoj Kumar, Yogendra Narayan Prajapati, Bhasker Pant, and Sneha Bohra. "Enhancing OTP Generation Efficiency through Cryptographic Techniques." In 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). IEEE, 2023. http://dx.doi.org/10.1109/icacite57410.2023.10182488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pateriya, Pushpendra Kumar, Mritunjay Rai, Krishna Prasad Mukherjee, and Gaurav Raj. "A Lightweight Cryptographic Algorithm using Trigonometric Technique." In 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE, 2018. http://dx.doi.org/10.1109/icacce.2018.8441670.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Somaschi, Niccolo. "Semiconductor quantum dot based single-photon sources as resources for quantum communication and cryptography applications." In Advanced Photon Counting Techniques XVI, edited by Mark A. Itzler, K. Alex McIntosh, and Joshua C. Bienfang. SPIE, 2022. http://dx.doi.org/10.1117/12.2618464.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hill, Alexander D., Bradley Christensen, and Paul G. Kwiat. "Advanced techniques for free-space optical quantum cryptography over water." In SPIE LASE, edited by Hamid Hemmati and Don M. Boroson. SPIE, 2016. http://dx.doi.org/10.1117/12.2218270.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vaibhavi, Aher, and Kulkarni Samidha. "Cryptography Technique for Data Hiding Application." In 2016 Sixth International Conference on Advanced Computing & Communication Technologies. Research Publishing Services, 2016. http://dx.doi.org/10.3850/978-981-11-0783-2_420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!