Academic literature on the topic 'Cryptographes'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cryptographes.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cryptographes"
Yan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)." Journal of Physics: Conference Series 2386, no. 1 (2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Full textWANG, XINGYUAN, MING LIU, and NINI GU. "TWO NEW CHAOTIC CRYPTOGRAPHIES BASED ON DIFFERENT ATTRACTOR-PARTITION ALGORITHMS." International Journal of Modern Physics B 21, no. 27 (2007): 4739–50. http://dx.doi.org/10.1142/s0217979207038071.
Full textSaputra, Joni, Herliana Rosika, and M. Afriasyah. "Implementation Of Current Algorithm With Fibonnaci Series And Hexagonal Formula To Encode Messages." SainsTech Innovation Journal 4, no. 2 (2021): 134–38. http://dx.doi.org/10.37824/sij.v4i2.2021.270.
Full textSun, Pu, Fu Song, Yuqi Chen, and Taolue Chen. "EasyBC: A Cryptography-Specific Language for Security Analysis of Block Ciphers against Differential Cryptanalysis." Proceedings of the ACM on Programming Languages 8, POPL (2024): 848–81. http://dx.doi.org/10.1145/3632871.
Full textSabani, Maria E., Ilias K. Savvas, and Georgia Garani. "Learning with Errors: A Lattice-Based Keystone of Post-Quantum Cryptography." Signals 5, no. 2 (2024): 216–43. http://dx.doi.org/10.3390/signals5020012.
Full textNajeeb, Mahira, Dr Ammar Masood, and Dr Adnan Fazil. "Quantum Key Distribution for Secure Communications." Vol 4 Issue 4 4, no. 4 (2022): 173–83. http://dx.doi.org/10.33411/ijist/2022040406.
Full textGoldreich, Oded. "Cryptography and cryptographic protocols." Distributed Computing 16, no. 2-3 (2003): 177–99. http://dx.doi.org/10.1007/s00446-002-0077-1.
Full textShah, Aayush, Prabhat Mahato, and Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Full textBAFTIU, Naim. "Analysis and use of Cryptography techniques in programming language C#: Coding and Decoding." PRIZREN SOCIAL SCIENCE JOURNAL 4, no. 3 (2020): 1–10. http://dx.doi.org/10.32936/pssj.v4i3.165.
Full textAnilkumar, Chunduru, Bhavani Gorle, and Kinthali Sowmya. "A Secure Method of Communication in Conventional Cryptography using Quantum Key Distribution." Applied and Computational Engineering 8, no. 1 (2023): 68–73. http://dx.doi.org/10.54254/2755-2721/8/20230083.
Full textDissertations / Theses on the topic "Cryptographes"
Poschmann, Axel York. "Lightweight cryptography cryptographic engineering for a pervasive world." Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2009. http://d-nb.info/996578153/04.
Full textAlmeida, Braga Daniel de. "Cryptography in the wild : the security of cryptographic implementations." Thesis, Rennes 1, 2022. http://www.theses.fr/2022REN1S067.
Full textScerri, Guillaume. "Proof of security protocols revisited." Thesis, Cachan, Ecole normale supérieure, 2015. http://www.theses.fr/2015DENS0002/document.
Full textMinaud, Brice. "Analyse de primitives cryptographiques récentes." Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1S066/document.
Full textBultel, Xavier. "Mécanismes de délégation pour les primitives de cryptographie à clé publique." Thesis, Université Clermont Auvergne (2017-2020), 2018. http://www.theses.fr/2018CLFAC100.
Full textPaindavoine, Marie. "Méthodes de calculs sur les données chiffrées." Thesis, Lyon, 2017. http://www.theses.fr/2017LYSE1009/document.
Full textWen, Weiqiang. "Contributions to the hardness foundations of lattice-based cryptography." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSEN070/document.
Full textLöken, Nils [Verfasser]. "Cryptography for the crowd : a study of cryptographic schemes with applications to crowd work / Nils Löken." Paderborn : Universitätsbibliothek, 2019. http://d-nb.info/1203205074/34.
Full textLambin, Baptiste. "Optimization of core components of block ciphers." Thesis, Rennes 1, 2019. http://www.theses.fr/2019REN1S036/document.
Full textDelaplace, Claire. "Algorithmes d'algèbre linéaire pour la cryptographie." Thesis, Rennes 1, 2018. http://www.theses.fr/2018REN1S045/document.
Full textBooks on the topic "Cryptographes"
Sokolov, Artem, and Oleg Zhdanov. Cryptographic constructions on the basis of functions of multivalued logic. INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1045434.
Full textUnited States. National Security Agency/Central Security Service. Center for Cryptologic History, ed. The Friedman legacy: A tribute to William and Elizebeth Friedman. 3rd ed. The Center, 2006.
Find full textF, Friedman William. The Friedman legacy: A tribute to William and Elizebeth Friedman. The Center, 1992.
Find full textChurchhouse, R. F. Codes and ciphers: Julius Caesar, the Enigma, and the internet. Cambridge University Press, 2002.
Find full textStinson, Douglas R., and Maura B. Paterson. Cryptography. Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9781315282497.
Full textRubinstein-Salzedo, Simon. Cryptography. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94818-8.
Full textLevy, Steven. Crypto: How the code rebels beat the government-saving privacy in the digital age. Viking, 2001.
Find full textB, Rowlett Frank. The story of MAGIC: Memoirs of an American cryptologic pioneer. Aegean Park Press, 1998.
Find full textBook chapters on the topic "Cryptographes"
Hofheinz, Dennis, and Eike Kiltz. "Scalable Cryptography." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-21534-6_9.
Full textLin, Weyde. "Digital Signature." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_15.
Full textZheng, Zhiyong, Kun Tian, and Fengxia Liu. "A Generalization of NTRUencrypt." In Financial Mathematics and Fintech. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-7644-5_7.
Full textMoosavi, Sanaz Rahimi, and Arman Izadifar. "End-to-End Security Scheme for E-Health Systems Using DNA-Based ECC." In Silicon Valley Cybersecurity Conference. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96057-5_6.
Full textBuchmann, Johannes. "Sustainable Cryptography." In International Symposium on Mathematics, Quantum Theory, and Cryptography. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5191-8_1.
Full textCook, Debra L., John Ioannidis, Angelos D. Keromytis, and Jake Luck. "CryptoGraphics: Secret Key Cryptography Using Graphics Cards." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30574-3_23.
Full textJo, Hyungrok, Shingo Sugiyama, and Yoshinori Yamasaki. "Ramanujan Graphs for Post-Quantum Cryptography." In International Symposium on Mathematics, Quantum Theory, and Cryptography. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5191-8_17.
Full textCachin, Christian. "Multi-Party Threshold Cryptography." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_13.
Full textSommerhalder, Maria. "Hardware Security Module." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_16.
Full textDupont, Briag, Christian Franck, and Johann Großschädl. "Fast and Flexible Elliptic Curve Cryptography for Dining Cryptographers Networks." In Mobile, Secure, and Programmable Networking. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67550-9_7.
Full textConference papers on the topic "Cryptographes"
Faz-Hernández, Armando, and Julio López. "High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves." In Concurso de Teses e Dissertações. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/ctd.2023.230156.
Full textЛацин, Семен Михайлович, and Наталья Александровна Борсук. "ANALYSIS OF ELLIPTICAL CRYPTOGRAPHY ON THE EXAMPLE OF THE BITCOIN BLOCKCHAIN." In Методики фундаментальных и прикладных научных исследований: сборник статей всероссийской научной конференции (Санкт-Петербург, Декабрь 2022). Crossref, 2023. http://dx.doi.org/10.37539/221223.2022.83.11.008.
Full textDuta, Cristinaloredana, and Laura Gheorghe. "ELEARNING FRAMEWORK FOR UNDERSTANDING CRYPTOGRAPHY AT ALL LEVELS." In eLSE 2015. Carol I National Defence University Publishing House, 2015. http://dx.doi.org/10.12753/2066-026x-15-026.
Full textSlutsky, Boris A., R. Rao, L. Tancevski, P. C. Sun, and Y. Fainman. "Information Leakage Estimates in Quantum Cryptography." In Optics in Computing. Optica Publishing Group, 1997. http://dx.doi.org/10.1364/oc.1997.owc.2.
Full textPacheco, Rodrigo, Douglas Braga, Iago Passos, Thiago Araújo, Vinícius Lagrota, and Murilo Coutinho. "libharpia: a New Cryptographic Library for Brazilian Elections." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbseg.2022.224098.
Full textRodrigues, Gustavo Eloi de P., Alexandre M. Braga, and Ricardo Dahab. "A machine learning approach to detect misuse of cryptographic APIs in source code." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19223.
Full textAdebisi Ojo, Segun, Aderonke Favour-Bethy Thompson, Mary O Iyare, and Boniface Kayode Alese. "On Information Integrity Measurement with Secure Hash Algorithm (SHA)." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2154.
Full textBraga, Alexandre, and Ricardo Dahab. "A Longitudinal and Retrospective Study on How Developers Misuse Cryptography in Online Communities." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/sbseg.2017.19488.
Full textXia, Ruiqi, Manman Li, and Shaozhen Chen. "Cryptographic Algorithms Identification based on Deep Learning." In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121217.
Full textFokin, V. G., and V. A. Zakharova. "Development of quantum communication." In Modern Problems of Telecommunications - 2024. Siberian State University of Telecommunications and Information Systems, 2024. http://dx.doi.org/10.55648/spt-2024-1-44.
Full textReports on the topic "Cryptographes"
de Abreu, Jonas, and Mariana Cunha e Melo. Extending Pix: An approach to offline Dynamic QR Code generation. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/9qu6ex.
Full textMouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8319.
Full textBlake-Wilson, S., D. Brown, and P. Lambert. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3278.
Full textTurner, S., and D. Brown. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5753.
Full textBarker, William, William Polk, and Murugiah Souppaya. Getting Ready for Post-Quantum Cryptography: Exploring Challenges Associated with Adopting and Using Post-Quantum Cryptographic Algorithms. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.cswp.04282021.
Full textBarker, William. Getting Ready for Post-Quantum Cryptography: Exploring Challenges Associated with Adopting and Using Post-Quantum Cryptographic Algorithms. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.cswp.15.
Full textTaiber, Joachim. Unsettled Topics Concerning the Impact of Quantum Technologies on Automotive Cybersecurity. SAE International, 2020. http://dx.doi.org/10.4271/epr2020026.
Full textHousley, R. Cryptographic Message Syntax. RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2630.
Full textBaker, F., B. Lindell, and M. Talwar. RSVP Cryptographic Authentication. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2747.
Full textAtkinson, R., and M. Fanto. RIPv2 Cryptographic Authentication. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4822.
Full text