Academic literature on the topic 'Crypto analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Crypto analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Crypto analysis"
Rouhani, Saeed, and Ehsan Abedin. "Crypto-currencies narrated on tweets: a sentiment analysis approach." International Journal of Ethics and Systems 36, no. 1 (2019): 58–72. http://dx.doi.org/10.1108/ijoes-12-2018-0185.
Full textMAGOMEDOV, RAMAZAN M. "CRYPTO VOLT MARKET ANALYSIS. BITCOINS." INTERNATIONAL SCIENTIFIC JOURNAL, no. 3 (2020): 81–86. http://dx.doi.org/10.34286/1995-4638-2020-72-3-81-86.
Full textKanarachos, A., and Ch Provatidis. "Crypto-DOF finite elements." International Journal for Numerical Methods in Engineering 28, no. 4 (1989): 943–54. http://dx.doi.org/10.1002/nme.1620280415.
Full textGurrib, Ikhlaas. "Can energy commodities affect energy blockchain-based cryptos?" Studies in Economics and Finance 36, no. 4 (2019): 682–99. http://dx.doi.org/10.1108/sef-10-2018-0313.
Full textVaz de Melo Mendes, Beatriz, and André Fluminense Carneiro. "A Comprehensive Statistical Analysis of the Six Major Crypto-Currencies from August 2015 through June 2020." Journal of Risk and Financial Management 13, no. 9 (2020): 192. http://dx.doi.org/10.3390/jrfm13090192.
Full textBabynjuk, Olexandra, Alla Nahirna, and Olexandra Nahorna. "Lucifer encrypt algorithm and its crypto analysis." Modeling and Information Systems in Economics, no. 98 (November 28, 2019): 13–24. http://dx.doi.org/10.33111/mise.98.2.
Full textLee, Kyungroul, Insu Oh, Sun-Young Lee, and Kangbin Yim. "Vulnerability Analysis on the CNG Crypto Library." Journal of Korean Institute of Communications and Information Sciences 42, no. 4 (2017): 838–47. http://dx.doi.org/10.7840/kics.2017.42.4.838.
Full textConrady, Beate, Michael Brunauer, and Franz-Ferdinand Roch. "Cryptosporidium spp. Infections in Combination with Other Enteric Pathogens in the Global Calf Population." Animals 11, no. 6 (2021): 1786. http://dx.doi.org/10.3390/ani11061786.
Full textBrunauer, Michael, Franz-Ferdinand Roch, and Beate Conrady. "Prevalence of Worldwide Neonatal Calf Diarrhoea Caused by Bovine Rotavirus in Combination with Bovine Coronavirus, Escherichia coli K99 and Cryptosporidium spp.: A Meta-Analysis." Animals 11, no. 4 (2021): 1014. http://dx.doi.org/10.3390/ani11041014.
Full textArias-Oliva, Mario, Jorge de Andrés-Sánchez, and Jorge Pelegrín-Borondo. "Fuzzy Set Qualitative Comparative Analysis of Factors Influencing the Use of Cryptocurrencies in Spanish Households." Mathematics 9, no. 4 (2021): 324. http://dx.doi.org/10.3390/math9040324.
Full textDissertations / Theses on the topic "Crypto analysis"
Hillerup, Jens Christian. "Crypto analysis and its applications to password hashing." Thesis, KTH, Kommunikationssystem, CoS, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142651.
Full textKannavara, Raghudeep. "DESIGN AND PERFORMANCE ANALYSIS OF A SECURE PROCES-SOR SCAN-SP WITH CRYPTO-BIOMETRIC CAPABILITIES." Wright State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=wright1254532768.
Full textNyarugwe, Raymond Tendai. "An analysis of the Zimbabwean money laundering and proceeds of crime amendment act of 2018." University of Western Cape, 2020. http://hdl.handle.net/11394/8057.
Full textValinčius, Tomas. "Programinės įrangos ir duomenų saugumas: grėsmės ir jų valdymas, šifravimo algoritmai." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2008. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2008~D_20080811_151738-05648.
Full textRingmann, Björn, and Peter Hildeblom. "Minnet sviker Aldrig : Att utnyttja volatil data i Krypterade system." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-26424.
Full textDaněček, Petr. "Útoky na kryptografické moduly." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-233418.
Full textRitchie, Justine Marie. "Methods for statistical analysis of colonic crypt labelling." Diss., The University of Arizona, 1994. http://hdl.handle.net/10150/186850.
Full textNelson, Martin. "Biomechanical modelling of colorectal crypt formation and in-vitro replication." Thesis, University of Nottingham, 2011. http://eprints.nottingham.ac.uk/11778/.
Full textKorada, Anu. "3D analysis of mandibular deciduous tooth crypts using μCT imaging". Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/58910.
Full textMalm, Victor, and Tobias Bjurhall. "Virtuella valutor : riskanalys av nya betalningsmedel." Thesis, Högskolan i Borås, Akademin för textil, teknik och ekonomi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-556.
Full textBooks on the topic "Crypto analysis"
Bamikunle, Aderemi James. Introduction to Soyinka's poetry: Analysis of A shuttle in the crypt. Ahmadu Bello University Press, 1991.
Find full textservice), ScienceDirect (Online. Cryo-EM: Analyses, interpretation, and case studies. Academic Press/Elsevier, 2010.
Find full textHolden, Matthew T. G. Molecular genetic analysis of cryptic antibiotic genes in Erwinia Carotovora subsp. Carotovora. typescript, 1996.
Find full textCryo-EM, Part C: Analyses, Interpretation, and Case studies. Elsevier, 2010. http://dx.doi.org/10.1016/c2010-0-66530-8.
Full textLtd, ICON Group. CRYO: Labor Productivity Benchmarks and International Gap Analysis (Labor Productivity Series). 2nd ed. Icon Group International, 2000.
Find full textLtd, ICON Group. CRYO: International Competitive Benchmarks and Financial Gap Analysis (Financial Performance Series). 2nd ed. Icon Group International, 2000.
Find full textLtd, ICON Group. CRYO INTERACTIVE ENTERTAINMENT SA: International Competitive Benchmarks and Financial Gap Analysis (Financial Performance Series). 2nd ed. Icon Group International, Inc., 2000.
Find full textLtd, ICON Group. CRYO-CELL INTERNATIONAL, INC.: Labor Productivity Benchmarks and International Gap Analysis (Labor Productivity Series). 2nd ed. Icon Group International, 2000.
Find full textLtd, ICON Group. CRYO-CELL INTERNATIONAL, INC.: International Competitive Benchmarks and Financial Gap Analysis (Financial Performance Series). 2nd ed. Icon Group International, 2000.
Find full textLtd, ICON Group. CRYO INTERACTIVE ENTERTAINMENT SA: Labor Productivity Benchmarks and International Gap Analysis (Labor Productivity Series). 2nd ed. Icon Group International, Inc., 2000.
Find full textBook chapters on the topic "Crypto analysis"
Popuri, Manoj Kumar, and Mehmet Hadi Gunes. "Empirical Analysis of Crypto Currencies." In Studies in Computational Intelligence. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30569-1_21.
Full textKocher, Paul, Joshua Jaffe, and Benjamin Jun. "Differential Power Analysis." In Advances in Cryptology — CRYPTO’ 99. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48405-1_25.
Full textGoyal, Parth S., Akshat Kakkar, Gopika Vinod, and Gigi Joseph. "Crypto-Ransomware Detection Using Behavioural Analysis." In Reliability, Safety and Hazard Assessment for Risk-Based Technologies. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9008-1_20.
Full textBarbosa, Manuel, Alexandra Boldyreva, Shan Chen, and Bogdan Warinschi. "Provable Security Analysis of FIDO2." In Advances in Cryptology – CRYPTO 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-84252-9_5.
Full textHoang, Viet Tung, and Yaobin Shen. "Security Analysis of NIST CTR-DRBG." In Advances in Cryptology – CRYPTO 2020. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-56784-2_8.
Full textGolić, Jovan D. "Correlation Analysis of the Shrinking Generator." In Advances in Cryptology — CRYPTO 2001. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44647-8_26.
Full textTaguchi, Wataru, and Kazumasa Omote. "Risk Analysis for Worthless Crypto Asset Networks." In Advanced Information Networking and Applications. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-75075-6_48.
Full textBiham, Eli, and Adi Shamir. "Differential fault analysis of secret key cryptosystems." In Advances in Cryptology — CRYPTO '97. Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0052259.
Full textNguyen, Phong Q., and David Pointcheval. "Analysis and Improvements of NTRU Encryption Paddings." In Advances in Cryptology — CRYPTO 2002. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45708-9_14.
Full textLee, Hyung Tae, and Jae Hong Seo. "Security Analysis of Multilinear Maps over the Integers." In Advances in Cryptology – CRYPTO 2014. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-44371-2_13.
Full textConference papers on the topic "Crypto analysis"
Lee, Kyungroul, Ilsun You, and Kangbin Yim. "Vulnerability Analysis on the CNG Crypto Library." In 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). IEEE, 2015. http://dx.doi.org/10.1109/imis.2015.34.
Full textBistarelli, Stefano, Ivan Mercanti, and Francesco Santini. "An Analysis of Non-standard Bitcoin Transactions." In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). IEEE, 2018. http://dx.doi.org/10.1109/cvcbt.2018.00016.
Full textSun, Yujing, Hao Xiong, Siu Ming Yiu, and Kwok Yan Lam. "BitVis: An Interactive Visualization System for Bitcoin Accounts Analysis." In 2019 Crypto Valley Conference on Blockchain Technology (CVCBT). IEEE, 2019. http://dx.doi.org/10.1109/cvcbt.2019.000-3.
Full textLingxiao Wei, Jie Zhang, Feng Yuan, Yannan Liu, Junfeng Fan, and Qiang Xu. "Vulnerability analysis for crypto devices against probing attack." In 2015 20th Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE, 2015. http://dx.doi.org/10.1109/aspdac.2015.7059113.
Full textKizhvatov, Ilya. "Side channel analysis of AVR XMEGA crypto engine." In the 4th Workshop. ACM Press, 2009. http://dx.doi.org/10.1145/1631716.1631724.
Full textKARA, Ilker, and Murat AYDOS. "Cyber Fraud: Detection and Analysis of the Crypto-Ransomware." In 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 2020. http://dx.doi.org/10.1109/uemcon51285.2020.9298128.
Full textBhat, Meenakshi, and Shafalika Vijayal. "A Probabilistic Analysis on Crypto-Currencies Based on Blockchain." In 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS). IEEE, 2017. http://dx.doi.org/10.1109/icngcis.2017.37.
Full textEl-Hadedy, Mohamed, and Kevin Skadron. "Hardware overhead analysis of programmability in ARX crypto processing." In ISCA '15: The 42nd Annual International Symposium on Computer Architecture. ACM, 2015. http://dx.doi.org/10.1145/2768566.2768574.
Full textHan, Runchao, Nikos Foutris, and Christos Kotselidis. "Demystifying Crypto-Mining: Analysis and Optimizations of Memory-Hard PoW Algorithms." In 2019 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS). IEEE, 2019. http://dx.doi.org/10.1109/ispass.2019.00011.
Full textKURD, Abdulsamad, and Nurettin BESLI. "Analysis of the Cryptography Methods for Design of Crypto-Processor." In 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA). IEEE, 2020. http://dx.doi.org/10.1109/hora49412.2020.9152929.
Full textReports on the topic "Crypto analysis"
Clark, D. D0 Cryo-Corner Piping Flexibility Analysis. Office of Scientific and Technical Information (OSTI), 1991. http://dx.doi.org/10.2172/1031760.
Full text