Academic literature on the topic 'Cryptografie'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cryptografie.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cryptografie"
Roussel, N., O. Potin, J. B. Rigaud, and J. M. Dutertre. "Implémentation matérielle d’un algorithme de cryptographie légère pour objets connectés." J3eA 21 (2022): 1004. http://dx.doi.org/10.1051/j3ea/20221004.
Full textMargel, Serge. "Le cryptogramme coranique." Po&sie 127, no. 1 (2009): 12. http://dx.doi.org/10.3917/poesi.127.0012.
Full textJollivet, Pascal. "Politiques de la cryptographie." Multitudes 7, no. 4 (2001): 242. http://dx.doi.org/10.3917/mult.007.0242.
Full textLhomme-Rigaud, Colette. "Le cryptogramme du toxicomane." Cliniques méditerranéennes 64, no. 2 (2001): 207. http://dx.doi.org/10.3917/cm.064.0207.
Full textBencheikh, K., A. Jankovic, T. Symul, and J. A. Levenson. "Cryptographie quantique à variables continues." Journal de Physique IV (Proceedings) 12, no. 5 (2002): 167–69. http://dx.doi.org/10.1051/jp4:20020120.
Full textDiamanti, Eleni. "Progrés et défis pour la cryptographie quantique." Photoniques, no. 91 (May 2018): 33–37. http://dx.doi.org/10.1051/photon/20189133.
Full textCohen, Robert, Mireille Campana, and Marc Girault. "Une formule de dénombrement servant en cryptographie." Annales des Télécommunications 44, no. 7-8 (1989): 405–11. http://dx.doi.org/10.1007/bf03012330.
Full textPavlovic, Diane. "Du cryptogramme au nom réfléchi. L’onomastique ducharmienne." Études françaises 23, no. 3 (1987): 89. http://dx.doi.org/10.7202/035729ar.
Full textSirvent, Thomas. "La cryptographie, socle de la souveraineté numérique." Revue Défense Nationale N° 855, no. 10 (2022): 59–66. http://dx.doi.org/10.3917/rdna.855.0059.
Full textGabrielle De Micheli. "Exponentiation modulaire pour la cryptographie à clé publique." Bulletin 1024, no. 19 (April 2022): 75–80. http://dx.doi.org/10.48556/sif.1024.19.75.
Full textDissertations / Theses on the topic "Cryptografie"
Enjalbert, Jean-Yves. "Jacobiennes et cryptographie." Limoges, 2003. http://aurore.unilim.fr/theses/nxfile/default/854e5935-f421-48d7-9536-bde4de98e822/blobholder:0/2003LIMO0031.pdf.
Full textLoidreau, Pierre. "Metrique rang et cryptographie." Habilitation à diriger des recherches, Université Pierre et Marie Curie - Paris VI, 2007. http://tel.archives-ouvertes.fr/tel-00200407.
Full textDelerablée, Cécile. "Cryptographie dans les groupes." Paris 7, 2009. http://www.theses.fr/2009PA077111.
Full textFuchsbauer, Georg. "Cryptographie dans les groupes." Paris 7, 2010. http://www.theses.fr/2010PA077121.
Full textBisson, Gaëtan. "Anneaux d'endomorphismes en cryptographie." Thesis, Vandoeuvre-les-Nancy, INPL, 2011. http://www.theses.fr/2011INPL047N/document.
Full textStehlé, Damien. "Réseaux Euclidiens : Algorithmes et Cryptographie." Habilitation à diriger des recherches, Ecole normale supérieure de lyon - ENS LYON, 2011. http://tel.archives-ouvertes.fr/tel-00645387.
Full textPlantard, Thomas. "Arithmétique modulaire pour la cryptographie." Phd thesis, Université Montpellier II - Sciences et Techniques du Languedoc, 2005. http://tel.archives-ouvertes.fr/tel-00112121.
Full textTualle-Brouri, Rosa. "Dispositifs pour la cryptographie quantique." Habilitation à diriger des recherches, Université Paris Sud - Paris XI, 2006. http://tel.archives-ouvertes.fr/tel-00369277.
Full textJavelle, Jérôme. "Cryptographie Quantique : Protocoles et Graphes." Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENM093/document.
Full textIonica, Sorina. "Algorithmique des couplages et cryptographie." Versailles-St Quentin en Yvelines, 2010. http://www.theses.fr/2010VERS0013.
Full textBooks on the topic "Cryptografie"
Nicole, Smans, ed. Geheimtaal: Dema gi schewerel dvangeh eimsch rifte nenver borge nscha tten. Cantecleer, 2002.
Find full textRobert, Rolland, and Véron Pascal, eds. Cryptographie: Principes et mises en oeuvre. Hermes Science, 2005.
Find full textVigoureux, Pierre. Cryptographie: Libertés individuelles et codes secrets. Ellipses, 2006.
Find full textBeutelspacher, Albrecht. Moderne Verfahren der Kryptographie: Von RSA zu Zero-Knowledge. 6th ed. Vieweg, 2006.
Find full textSchneier, Bruce. Cryptographie appliquée: Protocoles, algorithmes et codes sources en C. 2nd ed. Vuibert, 2001.
Find full textChurchhouse, R. F. Codes and ciphers: Julius Caesar, the Enigma, and the internet. Cambridge University Press, 2002.
Find full textBook chapters on the topic "Cryptografie"
Nicolas, Jean-Louis. "Arithmétique et Cryptographie." In Development of Mathematics, 1950–2000. Birkhäuser Basel, 2000. http://dx.doi.org/10.1007/978-3-0348-8968-1_28.
Full textIzmailov, Igor, Boris Poizner, Ilia Romanov, and Sergey Smolskiy. "Nonlinear-Dynamic Cryptology Versus Steganography and Cryptografics." In Cryptology Transmitted Message Protection. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30125-9_7.
Full textWitt, Cornelius. "Der Angeber, der keiner ist – Mark Tuttle, Gründer von cryptografx." In Startups international: Gründergeschichten rund um den Globus. Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-21722-8_24.
Full textWitt, Cornelius. "Der Angeber, der keiner ist – Mark Tuttle, Gründer von cryptografx." In Start-ups international: Gründergeschichten rund um den Globus. Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-658-10082-7_24.
Full text"Cryptographie et numérations." In Œuvres d’Ernest Coumet (T. 1). Presses universitaires de Franche-Comté, 2016. http://dx.doi.org/10.4000/books.pufc.13828.
Full text"2 La cryptographie symétrique moderne." In La cryptologie. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0995-0-004.
Full text"5 La cryptographie au quotidien." In La cryptologie. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0995-0-007.
Full text"2 La cryptographie symétrique moderne." In La cryptologie. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0995-0.c004.
Full text"5 La cryptographie au quotidien." In La cryptologie. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0995-0.c007.
Full textLosurdo, Domenico. "III. Révolution, censure et cryptographie." In Autocensure et compromis dans la pensée politique de Kant. Presses universitaires du Septentrion, 1993. http://dx.doi.org/10.4000/books.septentrion.73188.
Full textConference papers on the topic "Cryptografie"
"Cryptographie, watermarking, tatouage [breaker page]." In 2012 National Days of Network Security and Systems (JNS2). IEEE, 2012. http://dx.doi.org/10.1109/jns2.2012.6249235.
Full textIliyasu, Mohammed Awwal, Opeyemi Aderiike Abisoye, Sulaimon Adebayo Bashir, and Joseph Adebayo Ojeniyi. "A Review of Dna Cryptograhic Approaches." In 2020 IEEE 2nd International Conference on Cyberspace (CYBER NIGERIA). IEEE, 2021. http://dx.doi.org/10.1109/cybernigeria51635.2021.9428855.
Full textWang, Weizhen, Jun Han, Zhicheng Xie, Shan Huang, and Xiaoyang Zeng. "Cryptographie coprocessor design for IoT sensor nodes." In 2016 International SoC Design Conference (ISOCC). IEEE, 2016. http://dx.doi.org/10.1109/isocc.2016.7799761.
Full textKang, Hyunho, Yohei Hori, Toshihiro Katashita, Manabu Hagiwara, and Keiichi Iwamura. "Cryptographie key generation from PUF data using efficient fuzzy extractors." In 2014 16th International Conference on Advanced Communication Technology (ICACT). Global IT Research Institute (GIRI), 2014. http://dx.doi.org/10.1109/icact.2014.6778915.
Full textShuang Li, Nili Tian, Xiao-Zhi Zhang, Qing Miao, Weichao Kuang, and Wing-Kuen Ling. "Chaotic filter bank based computer cryptograpic system for wireless applications." In IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society. IEEE, 2016. http://dx.doi.org/10.1109/iecon.2016.7793543.
Full textSoni, Vineeta, Devershi Pallavi Bhatt, and Narendra Singh Yadav. "An Efficient approach of NeuroHash and its Comparision with Cryptograhic Hash." In 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2020. http://dx.doi.org/10.1109/icrito48877.2020.9197915.
Full textKester, Quist-Aphetsi, and Koudjo M. Koumadi. "Cryptographie technique for image encryption based on the RGB pixel displacement." In 2012 IEEE 4th International Conference on Adaptive Science & Technology (ICAST). IEEE, 2012. http://dx.doi.org/10.1109/icastech.2012.6381069.
Full text