Academic literature on the topic 'Cryptographic key generation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cryptographic key generation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cryptographic key generation"
Nurullaev, Mirkhon Mukhammadovich, and Rakhmatillo Djuraevich Aloev. "Working with cryptographic key information." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (2023): 911–19. https://doi.org/10.11591/ijece.v13i1.pp911-919.
Full textNathanael, Hizkia, and Alz Danny Wowor. "Chaos CSPRNG Design As a Key in Symmetric Cryptography Using Logarithmic Functions." Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika 21, no. 1 (2024): 83–91. http://dx.doi.org/10.33751/komputasi.v21i1.9265.
Full textTurčaník, Michal, and Martin Javurek. "Cryptographic Key Generation by Genetic Algorithms." Information & Security: An International Journal 43, no. 1 (2019): 54–61. http://dx.doi.org/10.11610/isij.4305.
Full textMukhammadovich, Nurullaev Mirkhon, and Aloev Rakhmatillo Djuraevich. "Working with cryptographic key information." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (2023): 911. http://dx.doi.org/10.11591/ijece.v13i1.pp911-919.
Full textPasupuleti, Murali Krishna. "Post-Quantum Cryptography: Algorithms and Implementation Challenges." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 06 (2025): 234–43. https://doi.org/10.62311/nesx/rphcrcscrbc4.
Full textKaleem, Waseem, Mohammad Sajid, and Ranjit Rajak. "Salp Swarm Algorithm to solve Cryptographic Key Generation problem for Cloud computing." International Journal of Experimental Research and Review 31, Spl Volume (2023): 85–97. http://dx.doi.org/10.52756/10.52756/ijerr.2023.v31spl.009.
Full textVlachou, C., J. Rodrigues, P. Mateus, N. Paunković, and A. Souto. "Quantum walk public-key cryptographic system." International Journal of Quantum Information 13, no. 07 (2015): 1550050. http://dx.doi.org/10.1142/s0219749915500501.
Full textB S Spoorthi. "Quantum Key Generation Integration with AES Encryption for Quantum Attack Resilience." Journal of Information Systems Engineering and Management 10, no. 31s (2025): 1069–76. https://doi.org/10.52783/jisem.v10i31s.5208.
Full textSagar Ramesh Rane. "Quantum-Resistant Cryptographic Algorithms: A Comparative Analysis for Securing Next-Generation Communication Networks." Journal of Information Systems Engineering and Management 10, no. 13s (2025): 725–31. https://doi.org/10.52783/jisem.v10i13s.2155.
Full textPasupuleti, Murali Krishna. "Algebraic Geometry Methods in Cryptographic Protocol Design." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 04 (2025): 296–304. https://doi.org/10.62311/nesx/rp2525.
Full textDissertations / Theses on the topic "Cryptographic key generation"
Park, DongGook. "Cryptographic protocols for third generation mobile communication systems." Thesis, Queensland University of Technology, 2001.
Find full textMokhled, Al Tarawneh. "Fingerprint image processing for generating biometric cryptographic key." Thesis, University of Newcastle Upon Tyne, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.514462.
Full textÇağrıcı, Gökhan Koltuksuz Ahmet. "An analysis of key generation efficiency of rsa cryptos ystem in distributed environments/." [s.l.]: [s.n.], 2005. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000406.pdf.
Full textQuist, Britton T. "Improved Channel Probing for Secret Key Generation with Multiple Antenna Systems." BYU ScholarsArchive, 2013. https://scholarsarchive.byu.edu/etd/3554.
Full textDel, Prete Simone. "Ray-tracing assessment of the robustness of Physical Layer Security key generation protocol." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/24081/.
Full textCederlöf, Jörgen. "Authentication in quantum key growing." Thesis, Linköping University, Department of Mathematics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-3214.
Full textPappala, Swetha. "Device Specific Key Generation Technique for Anti-Counterfeiting Methods Using FPGA Based Physically Unclonable Functions and Artificial Intelligence." University of Toledo / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1336613043.
Full textMarangon, Davide Giacomo. "Improving Quantum Key Distribution and Quantum Random Number Generation in presence of Noise." Doctoral thesis, Università degli studi di Padova, 2015. http://hdl.handle.net/11577/3424117.
Full textLeifgen, Matthias. "Protocols and components for quantum key distribution." Doctoral thesis, Humboldt-Universität zu Berlin, Mathematisch-Naturwissenschaftliche Fakultät, 2016. http://dx.doi.org/10.18452/17473.
Full textMazloum, Taghrid. "Analyse et modélisation du canal radio pour la génération de clés secrètes." Thesis, Paris, ENST, 2016. http://www.theses.fr/2016ENST0012/document.
Full textBooks on the topic "Cryptographic key generation"
Martin, Keith M. Key Management. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0010.
Full textBook chapters on the topic "Cryptographic key generation"
Suresh, K., Rajarshi Pal, and S. R. Balasundaram. "Fingerprint Based Cryptographic Key Generation." In Intelligent Data Communication Technologies and Internet of Things. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34080-3_79.
Full textKrähenbühl, Cyrill, and Adrian Perrig. "Key Management." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_4.
Full textGarcía-Perera, L. Paola, Juan A. Nolazco-Flores, and Carlos Mex-Perera. "Cryptographic-Speech-Key Generation Architecture Improvements." In Pattern Recognition and Image Analysis. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11492542_71.
Full textSarkar, Arpita, Binod Kr Singh, and Ujjayanta Bhaumik. "Cryptographic Key Generation Scheme from Cancellable Biometrics." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7871-2_26.
Full textAlharbi, Sarah, Md Saiful Islam, and Saad Alahmadi. "Time-Invariant Cryptographic Key Generation from Cardiac Signals." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32523-7_23.
Full textMishra, Pawan, Pooja, and Shashi Prakash Tripathi. "SwarmCryptOpt - enhancing cryptographic key generation through swarm intelligence." In Advances in Electronics, Computer, Physical and Chemical Sciences. CRC Press, 2025. https://doi.org/10.1201/9781003616252-44.
Full textSommerhalder, Maria. "Hardware Security Module." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_16.
Full textZheng, Zhiyong, Kun Tian, and Fengxia Liu. "A Generalization of NTRUencrypt." In Financial Mathematics and Fintech. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-7644-5_7.
Full textMaiti, Diptadip, Madhuchhanda Basak, and Debashis Das. "Fingerprint-Based Asymmetric Bio-Cryptographic Key Generation Using Convolution Network." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9040-5_3.
Full textGarcia-Baleon, H. A., V. Alarcon-Aquino, and O. Starostenko. "K-Medoids-Based Random Biometric Pattern for Cryptographic Key Generation." In Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10268-4_10.
Full textConference papers on the topic "Cryptographic key generation"
Ren, Yichong, Chia-Heng Sun, and Pai-Yen Chen. "Cryptographic Key Generation Based on RF Graphene Quantum Capacitor Trimmers." In 2024 IEEE International Conference on RFID Technology and Applications (RFID-TA). IEEE, 2024. https://doi.org/10.1109/rfid-ta64374.2024.10965150.
Full textRaikwal, Pushpa, Nipun Gupta, Nikhil Agarwal, Mahima Maheshwari, and Neelam Dayal. "Security Key Generation in SRAM based PUF for Cryptographic Applications." In 2025 Fifth International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT). IEEE, 2025. https://doi.org/10.1109/icaect63952.2025.10958966.
Full textPandey, Anvesha, Tanu, Yashdeep Tyagi, Shashank Varshney, Arun Kumar Maurya, and Nitin Sharma. "A Novel Cryptographic Approach: Armstrong Number Key Generation with RGB Encoding for Enhanced Data." In 2024 3rd International Conference on Automation, Computing and Renewable Systems (ICACRS). IEEE, 2024. https://doi.org/10.1109/icacrs62842.2024.10841574.
Full textShakil, Faisal Amin, Mirza Mahir Faiaz, and Fakir Sharif. "Modeling Attack Resistant Enhanced Cryptographic Key Generation and Optimized Selection Using Crossover Ring Oscillator PUF." In 2024 27th International Conference on Computer and Information Technology (ICCIT). IEEE, 2024. https://doi.org/10.1109/iccit64611.2024.11022544.
Full textKhan, Muhammad Shahbaz, Jawad Ahmad, Muhammad Ali, Ahmed Al Dubai, Nikolaos Pitropakis, and William J. Buchanan. "VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography." In 2024 IEEE 7th International Conference on Advanced Technologies, Signal and Image Processing (ATSIP). IEEE, 2024. http://dx.doi.org/10.1109/atsip62566.2024.10639041.
Full textMiah, Arafat, Faisal Amin, and Fakir Sharif Hossain. "Generating Robust Cryptographic Keys using Crossover Ring Oscillator PUFs: Resilience against Machine Learning Attacks." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724123.
Full textS, Samra S., Sreehari K. N, and Ramesh Bhakthavatchalu. "PUF Based Cryptographic Key Generation." In 2022 2nd Asian Conference on Innovation in Technology (ASIANCON). IEEE, 2022. http://dx.doi.org/10.1109/asiancon55314.2022.9908649.
Full textFreire-Santos, M., J. Fierrez-Aguilar, and J. Ortega-Garcia. "Cryptographic key generation using handwritten signature." In Defense and Security Symposium, edited by Patrick J. Flynn and Sharath Pankanti. SPIE, 2006. http://dx.doi.org/10.1117/12.665875.
Full textMoosavi, Sanaz Rahimi, Ethiopia Nigussie, Seppo Virtanen, and Jouni Isoaho. "Cryptographic key generation using ECG signal." In 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, 2017. http://dx.doi.org/10.1109/ccnc.2017.7983280.
Full textChen, B., and V. Chandran. "Biometric Based Cryptographic Key Generation from Faces." In 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007). IEEE, 2007. http://dx.doi.org/10.1109/dicta.2007.4426824.
Full textReports on the topic "Cryptographic key generation"
Barker, Elaine, and Allen Roginsky. Recommendation for Cryptographic Key Generation. National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.sp.800-133.
Full textBarker, Elaine, and Allen Roginsky. Recommendation for cryptographic key generation. National Institute of Standards and Technology, 2019. http://dx.doi.org/10.6028/nist.sp.800-133r1.
Full textBarker, Elaine, Allen Roginsky, and Richard Davis. Recommendation for cryptographic key generation. National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.sp.800-133r2.
Full textPasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.
Full textYuen, Horace P. Physical Cryptography: A New Approach to Key Generation and Direct Encryption. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada512847.
Full textLeathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48596.
Full textYoung, Derek P., Michael A. Forman, and Donald Ryan Dowdle. The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz. Office of Scientific and Technical Information (OSTI), 2010. http://dx.doi.org/10.2172/1008128.
Full textPerdigão, Rui A. P. Neuro-Quantum Cyber-Physical Intelligence (NQCPI). Synergistic Manifolds, 2024. http://dx.doi.org/10.46337/241024.
Full textPasupuleti, Murali Krishna. Quantum Semiconductors for Scalable and Fault-Tolerant Computing. National Education Services, 2025. https://doi.org/10.62311/nesx/rr825.
Full text