Academic literature on the topic 'Cryptographic devices'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cryptographic devices.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cryptographic devices"
John, Anita, and Jimmy Jose. "Hash Function Design Based on Hybrid Five-Neighborhood Cellular Automata and Sponge Functions." Complex Systems 32, no. 2 (2023): 171–88. http://dx.doi.org/10.25088/complexsystems.32.2.171.
Full textWai Kaey, Tan. "Navigating the Quantum Era: Exploring Lightweight Quantum-Resistant Cryptography." IC-ITECHS 5, no. 1 (2024): 586–96. https://doi.org/10.32664/ic-itechs.v5i1.1489.
Full textPyrkova, A. YU, and ZH E. Temirbekova. "Compare encryption performance across devices to ensure the security of the IOT." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 2 (2020): 894. http://dx.doi.org/10.11591/ijeecs.v20.i2.pp894-902.
Full textPyrkova, A. YU., and ZH.E. Temirbekova. "Compare encryption performance across devices to ensure the security of the IOT." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 2 (2020): 894–902. https://doi.org/10.11591/ijeecs.v20.i2.pp894-902.
Full textBhawna Garg. "Investigations on Application of Probabilistic and Mathematical Computing in Design and Statistical Analysis of Lightweight Cryptography." Communications on Applied Nonlinear Analysis 31, no. 2 (2024): 311–30. http://dx.doi.org/10.52783/cana.v31.571.
Full textSeptafiansyah, Dwi Putra, Yudhiprawira Mario, Sutikno Sarwono, Kurniawan Yusuf, and Suwandi Ahmad Adang. "Power analysis attack against encryption devices: a comprehensive analysis of AES, DES, and BC3." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 3 (2019): 1282–89. https://doi.org/10.12928/TELKOMNIKA.v17i3.9384.
Full textDe Moura, Pablo Rubens, Elmer Rolando Llanos Villarreal, Diego Antonio de Moura Fonsêca, and Andrés Ortiz Salazar. "Post-Quantum Cryptography for the Internet of Things: new approach." Journal of Engineering and Exact Sciences 11, no. 1 (2025): 21741. https://doi.org/10.18540/jcecvl11iss1pp21741.
Full textSundararajan, Ananiah Durai Durai, and Rajashree R. "A Comprehensive Survey on Lightweight Asymmetric Key Cryptographic Algorithm for Resource Constrained Devices." ECS Transactions 107, no. 1 (2022): 7457–68. http://dx.doi.org/10.1149/10701.7457ecst.
Full textChochtoula, Despoina, Aristidis Ilias, Yannis C. Stamatiou, and Christos Makris. "Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol." Future Internet 14, no. 8 (2022): 232. http://dx.doi.org/10.3390/fi14080232.
Full textJois, Tushar M., Gabrielle Beck, Sofia Belikovetsky, et al. "SocIoTy: Practical Cryptography in Smart Home Contexts." Proceedings on Privacy Enhancing Technologies 2024, no. 1 (2024): 447–64. http://dx.doi.org/10.56553/popets-2024-0026.
Full textDissertations / Theses on the topic "Cryptographic devices"
Keränen, V. (Vesa). "Cryptographic algorithm benchmarking in mobile devices." Master's thesis, University of Oulu, 2014. http://urn.fi/URN:NBN:fi:oulu-201401141005.
Full textSpadavecchia, Ljiljana. "A network-based asynchronous architecture for cryptographic devices." Thesis, University of Edinburgh, 2006. http://hdl.handle.net/1842/860.
Full textPretotto, Andrea <1989>. "Security and interoperability of APIs for cryptographic devices." Master's Degree Thesis, Università Ca' Foscari Venezia, 2014. http://hdl.handle.net/10579/4332.
Full textSleem, Lama. "Design and implementation of lightweight and secure cryptographic algorithms for embedded devices." Thesis, Bourgogne Franche-Comté, 2020. http://www.theses.fr/2020UBFCD018.
Full textJohansson, Emil. "Tamper Protection for Cryptographic Hardware : A survey and analysis of state-of-the-art tamper protection for communication devices handling cryptographic keys." Thesis, Linköpings universitet, Informationskodning, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-166083.
Full textStegemann, Dirk [Verfasser], and Matthias [Akademischer Betreuer] Krause. "Selected Cryptographic Methods for Securing Low-End Devices / Dirk Stegemann. Betreuer: Matthias Krause." Mannheim : Universitätsbibliothek Mannheim, 2011. http://d-nb.info/1034286595/34.
Full textLo, Johnny Li-Chang. "A framework for cryptography algorithms on mobile devices." Diss., University of Pretoria, 2007. http://hdl.handle.net/2263/28849.
Full textChan, Kevin Sean. "Towards securing networks of resource constrained devices a study of cryptographic primitives and key distribution schemes /." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26651.
Full textFerrari, Nico. "Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36975.
Full textDe, Santis Fabrizio [Verfasser], Georg [Akademischer Betreuer] Sigl, Stefan [Gutachter] Mangard, and Georg [Gutachter] Sigl. "Algorithmic and Protocol Level Countermeasures to Protect Cryptographic Devices / Fabrizio De Santis ; Gutachter: Stefan Mangard, Georg Sigl ; Betreuer: Georg Sigl." München : Universitätsbibliothek der TU München, 2018. http://d-nb.info/1163013382/34.
Full textBooks on the topic "Cryptographic devices"
Sahai, Amit. Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Springer Berlin Heidelberg, 2013.
Find full textIwama, Kazuo. Theory of Quantum Computation, Communication, and Cryptography: 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2013.
Find full textMartin, Keith M. Cryptography for Personal Devices. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0013.
Full textDiepenbroek, Martine. The Spartan Scytale and Developments in Ancient and Modern Cryptography. Bloomsbury Publishing Plc, 2023. http://dx.doi.org/10.5040/9781350281301.
Full textVasudevan, Amit, Jonathan M. McCune, and James Newsome. Trustworthy Execution on Mobile Devices. Springer, 2013.
Find full textTiwari, Sandip. Phenomena and devices at the quantum scale and the mesoscale. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198759874.003.0003.
Full textSahai, Amit. Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Springer, 2013.
Find full textData: Entrepreneur Mind, Security, Privacy, Online Safety, Viruses, Cryptography, Encryption,TR6 Digital Currencies, Mobile Phones, Tablets, e-Readers, Handheld, Devices, Business Law. Independently Published, 2022.
Find full textLeadership, Management and Data Science: Leadership, Management, Data Science, DM9, Hacking, Network Security, Privacy, Online Safety, Encryption, Viruses, Cryptography, Encryption, Digital Currencies, Mobile Phones, Tablets, e-Readers, Handheld and Devices. Independently Published, 2022.
Find full textBook chapters on the topic "Cryptographic devices"
Heins, Kersten. "Cryptographic Toolkit." In Trusted Cellular IoT Devices. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19663-8_3.
Full textMoosavi, Sanaz Rahimi, and Arman Izadifar. "End-to-End Security Scheme for E-Health Systems Using DNA-Based ECC." In Silicon Valley Cybersecurity Conference. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96057-5_6.
Full textHandschuh, Helena, Pascal Paillier, and Jacques Stern. "Probing Attacks On Tamper-Resistant Devices." In Cryptographic Hardware and Embedded Systems. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48059-5_26.
Full textBailey, Daniel V., Daniel Coffin, Adam Elbirt, Joseph H. Silverman, and Adam D. Woodbury. "NTRU in Constrained Devices." In Cryptographic Hardware and Embedded Systems — CHES 2001. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44709-1_22.
Full textDolezel, Radek, and Jens Myrup Pedersen. "Certificate-Based Authentication Using Hardware Cryptographic Devices." In Advances in Intelligent and Soft Computing. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23154-4_57.
Full textCheng, Wei, Sylvain Guilley, and Olivier Rioul. "Attacks on Protected Devices." In Mathematical Foundations for Side-Channel Analysis of Cryptographic Systems. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-64399-6_4.
Full textCheng, Wei, Sylvain Guilley, and Olivier Rioul. "Attacks on Unprotected Devices." In Mathematical Foundations for Side-Channel Analysis of Cryptographic Systems. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-64399-6_3.
Full textSkorobogatov, Sergei. "Data Remanence in Flash Memory Devices." In Cryptographic Hardware and Embedded Systems – CHES 2005. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11545262_25.
Full textSommerhalder, Maria. "Hardware Security Module." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_16.
Full textGüneysu, Tim, and Amir Moradi. "Generic Side-Channel Countermeasures for Reconfigurable Devices." In Cryptographic Hardware and Embedded Systems – CHES 2011. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23951-9_3.
Full textConference papers on the topic "Cryptographic devices"
Purohit, Neha, and Shubhalaxmi Joshi. "Comprehensive Analysis on Various Cryptographic Algorithm for Constrained Devices." In 2024 International Conference on Innovations and Challenges in Emerging Technologies (ICICET). IEEE, 2024. http://dx.doi.org/10.1109/icicet59348.2024.10616265.
Full textBhattacharya, Subha, Aakash Bose, Divyansh Dutta, Anirban Das, Shirshak Chakraborty, and Sayan Chatterjee. "Lightweight 64-bit AES-Inspired Symmetric Cryptographic Core for Low-Power and Resource-Constrained Systems." In 2025 Devices for Integrated Circuit (DevIC). IEEE, 2025. https://doi.org/10.1109/devic63749.2025.11012580.
Full textGarg, Aksh, Tejas Amritkar, Saravanan Vijayakumaran, and Laxmeesha Somappa. "A Cryptographic Security Engine With Sequence Tracker for Implantable Neural Stimulation Devices." In 2024 IEEE Biomedical Circuits and Systems Conference (BioCAS). IEEE, 2024. https://doi.org/10.1109/biocas61083.2024.10798193.
Full textRoy, Sunanda, Thomas Crowley, Brian L. Mark, Kai Zeng, and Khaled N. Khasawneh. "Evaluating and Optimizing Cryptographic Offloading for IoT Devices: Attribute-Based Encryption Case Study." In 2024 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, 2024. http://dx.doi.org/10.1109/iccworkshops59551.2024.10615320.
Full textK.S, Divya, Margaret Mary T, Sreeparna Chakrabarti, Prakash V.S, and K. Chitra. "Optimizing Lightweight Cryptographic Protocols for Secure Communication in Internet of Things(IoT) Devices." In 2024 5th International Conference on Communication, Computing & Industry 6.0 (C2I6). IEEE, 2024. https://doi.org/10.1109/c2i663243.2024.10894917.
Full textJuraev, Gayrat U., and Alisher B. Mavlonov. "Delving into Potential Asymmetric Cryptographic Algorithms for the Post-Quantum Era." In 2024 IEEE 25th International Conference of Young Professionals in Electron Devices and Materials (EDM). IEEE, 2024. http://dx.doi.org/10.1109/edm61683.2024.10615048.
Full textSampath, Amrutha, Kristofor Dickson, George W. Lange, Carey Wu, and Keith A. Serrels. "Evaluation of the Analyzability of Complex Secure Intellectual Property Using Fault Isolation Techniques versus the Hardware Security Threat They Pose." In ISTFA 2024. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0385.
Full textGupta, Ritik, Bukke Chandrababu Naik, and S. Sevagan. "High-Performance Accelerator for Post-Quantum Cryptography Using Crystals Dilithium with Area Optimization." In 2025 Devices for Integrated Circuit (DevIC). IEEE, 2025. https://doi.org/10.1109/devic63749.2025.11012511.
Full textAlam, Md Mokarram, Anamika Arora, Aditya Bhatt, Swati Devliyal, and Shefali Gupta. "Cryptographic Algorithms for IoT Devices." In 2024 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE). IEEE, 2024. http://dx.doi.org/10.1109/iitcee59897.2024.10467236.
Full textHomma, N. "Designing Secure Cryptographic Circuits." In 2019 IEEE International Electron Devices Meeting (IEDM). IEEE, 2019. http://dx.doi.org/10.1109/iedm19573.2019.8993646.
Full textReports on the topic "Cryptographic devices"
Sonmez Turan, Meltem. Ascon-Based Lightweight Cryptography Standards for Constrained Devices. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.sp.800-232.
Full textLeathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48596.
Full textPasupuleti, Murali Krishna. Quantum Semiconductors for Scalable and Fault-Tolerant Computing. National Education Services, 2025. https://doi.org/10.62311/nesx/rr825.
Full textData Encryption Standard. National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.
Full text