Journal articles on the topic 'Cryptographic key generation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cryptographic key generation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Nurullaev, Mirkhon Mukhammadovich, and Rakhmatillo Djuraevich Aloev. "Working with cryptographic key information." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (2023): 911–19. https://doi.org/10.11591/ijece.v13i1.pp911-919.
Full textNathanael, Hizkia, and Alz Danny Wowor. "Chaos CSPRNG Design As a Key in Symmetric Cryptography Using Logarithmic Functions." Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika 21, no. 1 (2024): 83–91. http://dx.doi.org/10.33751/komputasi.v21i1.9265.
Full textTurčaník, Michal, and Martin Javurek. "Cryptographic Key Generation by Genetic Algorithms." Information & Security: An International Journal 43, no. 1 (2019): 54–61. http://dx.doi.org/10.11610/isij.4305.
Full textMukhammadovich, Nurullaev Mirkhon, and Aloev Rakhmatillo Djuraevich. "Working with cryptographic key information." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (2023): 911. http://dx.doi.org/10.11591/ijece.v13i1.pp911-919.
Full textPasupuleti, Murali Krishna. "Post-Quantum Cryptography: Algorithms and Implementation Challenges." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 06 (2025): 234–43. https://doi.org/10.62311/nesx/rphcrcscrbc4.
Full textKaleem, Waseem, Mohammad Sajid, and Ranjit Rajak. "Salp Swarm Algorithm to solve Cryptographic Key Generation problem for Cloud computing." International Journal of Experimental Research and Review 31, Spl Volume (2023): 85–97. http://dx.doi.org/10.52756/10.52756/ijerr.2023.v31spl.009.
Full textVlachou, C., J. Rodrigues, P. Mateus, N. Paunković, and A. Souto. "Quantum walk public-key cryptographic system." International Journal of Quantum Information 13, no. 07 (2015): 1550050. http://dx.doi.org/10.1142/s0219749915500501.
Full textB S Spoorthi. "Quantum Key Generation Integration with AES Encryption for Quantum Attack Resilience." Journal of Information Systems Engineering and Management 10, no. 31s (2025): 1069–76. https://doi.org/10.52783/jisem.v10i31s.5208.
Full textSagar Ramesh Rane. "Quantum-Resistant Cryptographic Algorithms: A Comparative Analysis for Securing Next-Generation Communication Networks." Journal of Information Systems Engineering and Management 10, no. 13s (2025): 725–31. https://doi.org/10.52783/jisem.v10i13s.2155.
Full textPasupuleti, Murali Krishna. "Algebraic Geometry Methods in Cryptographic Protocol Design." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 04 (2025): 296–304. https://doi.org/10.62311/nesx/rp2525.
Full textH. Kuban, Kadhim, and Rasha Basim Al-Khafaji. "Proposed Biometric-Based Cryptographic Key Generation." JOURNAL OF COLLEGE OF EDUCATION FOR PURE SCIENCE 9, no. 2 (2019): 269–78. http://dx.doi.org/10.32792/utq.jceps.09.02.29.
Full textAmeer, Huda. "Cryptographic key Generation Using Fingerprint Biometrics." University of Thi-Qar Journal of Science 5, no. 2 (2015): 75–80. http://dx.doi.org/10.32792/utq/utjsci/v5i2.125.
Full textHimmat Rathore. "Next-generation cryptographic techniques for robust network security." World Journal of Advanced Research and Reviews 11, no. 3 (2021): 496–508. https://doi.org/10.30574/wjarr.2021.11.3.0413.
Full textSalman, Duha D., Raghad A. Azeez, and Adul mohssen J. Hossen. "Key Generation from Multibiometric System Using Meerkat Algorithm." Engineering and Technology Journal 38, no. 3B (2020): 115–27. http://dx.doi.org/10.30684/etj.v38i3b.652.
Full textSalman, Duha D., Raghad A. Azeez, and Adul mohssen J. Hossen. "Key Generation from Multibiometric System Using Meerkat Algorithm." Engineering and Technology Journal 38, no. 3B (2020): 115–27. http://dx.doi.org/10.30684/etj.v38i3b.652.
Full textRashid, Mofeed, and Huda Zaki. "RSA Cryptographic Key Generation Using Fingerprint Minutiae." Iraqi Journal for Computers and Informatics 41, no. 1 (2014): 66–69. http://dx.doi.org/10.25195/ijci.v41i1.101.
Full textAlshar’e, Marwan, Sharf Alzu’bi, Ahed Al-Haraizah, Hamzah Ali Alkhazaleh, Malik Jawarneh, and Mohammad Rustom Al Nasar. "Elliptic curve cryptography based light weight technique for information security." Bulletin of Electrical Engineering and Informatics 14, no. 3 (2025): 2300–2308. https://doi.org/10.11591/eei.v14i3.8587.
Full textSyed, Zubair Yuneeb Shakeeb Ahmed Tejas B. N. Sneha Singh Dr.C Nandini and Dr. Jahnavi Shankar. "Advanced Secured Key Generation Using User Face and Hand Geometry." INTERNATIONAL JOURNAL OF EMERGING TRENDS IN ENGINEERING AND DEVELOPMENT (IJETED) 15, no. 1 (2025): 52–61. https://doi.org/10.5281/zenodo.15280636.
Full textGuitouni, Zied, Aya Zairi, and Mounir Zrigui. "Implementation of Neural Key Generation Algorithm For IoT Devices." Journal of Computer Science Advancements 1, no. 5 (2024): 276–90. http://dx.doi.org/10.70177/jsca.v1i5.637.
Full textAlborch, Ferran, Ramiro Martínez, and Paz Morillo. "R-LWE-Based Distributed Key Generation and Threshold Decryption." Mathematics 10, no. 5 (2022): 728. http://dx.doi.org/10.3390/math10050728.
Full textKhamalwa, Mulemi Simiyu. "Exploring how Commutative Algebra Underpins Cryptographic Protocols and Encryption Methods Used in Secure Communications and Data Protection." NEWPORT INTERNATIONAL JOURNAL OF SCIENTIFIC AND EXPERIMENTAL SCIENCES 5, no. 3 (2024): 58–62. http://dx.doi.org/10.59298/nijses/2024/10.5.586237.
Full textMarimuthu, M., and A. Kannammal A.Kannammal. "Dual Fingerprints Fusion for Cryptographic Key Generation." International Journal of Computer Applications 122, no. 23 (2015): 20–25. http://dx.doi.org/10.5120/21865-5194.
Full textTeoh, Andrew B. J., David C. L. Ngo, and Alwyn Goh. "Personalised cryptographic key generation based on FaceHashing." Computers & Security 23, no. 7 (2004): 606–14. http://dx.doi.org/10.1016/j.cose.2004.06.002.
Full textMashael, Alsaleh, and Aldossary Abdullah. "Cryptographic Key Generation for Logically Shared Data Stores." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 58–59. https://doi.org/10.5281/zenodo.8185969.
Full textShi, Leyi, and Mengting Liu. "A Decentralized Signcryption Scheme Based on CFL." Sensors 25, no. 6 (2025): 1773. https://doi.org/10.3390/s25061773.
Full textCheremushkin, Alexander V. "ID-based public key cryptographic systems." Prikladnaya Diskretnaya Matematika, no. 61 (2023): 44–85. https://doi.org/10.17223/20710410/61/4.
Full textMamatha N and Sunitha S.S. "Exploring the properties of prime numbers in cryptography." World Journal of Advanced Research and Reviews 13, no. 1 (2022): 885–94. https://doi.org/10.30574/wjarr.2022.13.1.0078.
Full textPasunuru, Sreekanth, and Anil Kumar Malipeddi. "Cryptography in IoT: Securing the Next Generation of Connected Devices." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–6. https://doi.org/10.55041/ijsrem6584.
Full textAl Attar, Tara Nawzad Ahmad, and Rebaz Nawzad Mohammed. "Optimization of Lattice-Based Cryptographic Key Generation using Genetic Algorithms for Post-Quantum Security." UHD Journal of Science and Technology 9, no. 1 (2025): 93–105. https://doi.org/10.21928/uhdjst.v9n1y2025.pp93-105.
Full textMs., Kummasani Vinodhini. "Artifical Intelligence in Cryptography: Protection of Cryptographic System under Patents." Annual International Journal on Analysis of Contemporary Legal Affairs (AIJACLA) 5 (May 25, 2025): 95–111. https://doi.org/10.5281/zenodo.15514117.
Full textKuznetsov, Oleksandr, Nikolay Poluyanenko, Emanuele Frontoni, and Sergey Kandiy. "Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography." Cryptography 8, no. 2 (2024): 17. http://dx.doi.org/10.3390/cryptography8020017.
Full textAhmed, Zied O., and Abbas Akram Khorsheed. "Biometric key generation using crow algorithm." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 1 (2021): 208–14. https://doi.org/10.11591/ijeecs.v21.i1.pp208-214.
Full textAstuti, Nur Rochmah Dyah Puji, Dimas Panji Setiawan, and Dhias Cahya Hakika. "COMPARATIVE STUDY OF ELGAMAL AND LUC ALGORITHM IN CRYPTOGRAPHIC KEY GENERATION." ASEAN Engineering Journal 13, no. 4 (2023): 61–68. http://dx.doi.org/10.11113/aej.v13.19184.
Full textYuliana, Mike, Wirawan, and Suwadi. "An Efficient Key Generation for the Internet of Things Based Synchronized Quantization." Sensors 19, no. 12 (2019): 2674. http://dx.doi.org/10.3390/s19122674.
Full textKuznetsov, A. A., and D. O. Zakharov. "Deep learning-based models’ application to generating a cryptographic key from a face image." Radiotekhnika, no. 213 (June 16, 2023): 31–40. http://dx.doi.org/10.30837/rt.2023.2.213.03.
Full textBader, Ansam Sabah, Shaymaa Hameed, and Maisa’a Abid Ali K. "Key Generation based on Henon map and Lorenz system." Al-Mustansiriyah Journal of Science 31, no. 1 (2020): 41. http://dx.doi.org/10.23851/mjs.v31i1.734.
Full textAbdulwahid Hameed, Bahaa, and Ekhlas K. Gbashi. "A review of Chaotic Maps used for Generating Secure Random Keys." BIO Web of Conferences 97 (2024): 00070. http://dx.doi.org/10.1051/bioconf/20249700070.
Full textO. Ahmed, Zied, and Abbas Akram Khorsheed. "Biometric key generation using crow algorithm." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 1 (2021): 208. http://dx.doi.org/10.11591/ijeecs.v21.i1.pp208-214.
Full textSalman, Duha, Raghad Azeez, and Abdul Abdul-hossen. "BUILD CRYPTOGRAPHIC SYSTEM FROM MULTI-BIOMETRICS USING MEERKAT ALGORITHM." Iraqi Journal for Computers and Informatics 45, no. 2 (2019): 1–8. http://dx.doi.org/10.25195/ijci.v45i2.46.
Full textS, Vijay, Priya S, C. N. Harshavardhana, and Kemparaju R. "QUANTUM-RESISTANT CRYPTOGRAPHIC ALGORITHMS FOR SECURE COMMUNICATION." ICTACT Journal on Communication Technology 15, no. 3 (2024): 3276–81. http://dx.doi.org/10.21917/ijct.2024.0487.
Full textImamverdiev, Ya N., and L. V. Sukhostat. "A method for cryptographic key generation from fingerprints." Automatic Control and Computer Sciences 46, no. 2 (2012): 66–75. http://dx.doi.org/10.3103/s0146411612020022.
Full textZhang, Peng, Jiankun Hu, Cai Li, Mohammed Bennamoun, and Vijayakumar Bhagavatula. "A pitfall in fingerprint bio-cryptographic key generation." Computers & Security 30, no. 5 (2011): 311–19. http://dx.doi.org/10.1016/j.cose.2011.02.003.
Full textDang, Thao, and Deokjai Choi. "A Survey on Face-based Cryptographic Key Generation." Korean Institute of Smart Media 9, no. 2 (2020): 39–50. http://dx.doi.org/10.30693/smj.2020.9.2.39.
Full textBarman, Subhas, Debasis Samanta, and Samiran Chattopadhyay. "Approach to cryptographic key generation from fingerprint biometrics." International Journal of Biometrics 7, no. 3 (2015): 226. http://dx.doi.org/10.1504/ijbm.2015.071946.
Full textNajm, Hayder, Mohammed Salih Mahdi, and Sanaa Mohsin. "Novel Key Generator-Based SqueezeNet Model and Hyperchaotic Map." Data and Metadata 4 (March 12, 2025): 743. https://doi.org/10.56294/dm2025743.
Full textIovane, Gerardo, and Elmo Benedetto. "A Hybrid Key Generator Model Based on Multiscale Prime Sieve and Quantum-Inspired Approaches." Applied Sciences 15, no. 14 (2025): 7660. https://doi.org/10.3390/app15147660.
Full textVenkataramanna, Ramya Kothur, Manjunatha Reddy Hosur Sriram, and Bharathi Chowda Reddy. "Advancing cryptography: a novel hybrid cipher design merging Feistel and SPN structures." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 2 (2024): 751. http://dx.doi.org/10.11591/ijeecs.v35.i2.pp751-760.
Full textRamya, Kothur Venkataramanna Manjunatha Reddy Hosur Sriram Bharathi Chowda Reddy. "Advancing cryptography: a novel hybrid cipher design merging Feistel and SPN structures." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 2 (2024): 751–60. https://doi.org/10.11591/ijeecs.v35.i2.pp751-760.
Full textAminudin, Aminudin, and Eko Budi Cahyono. "A Practical Analysis of the Fermat Factorization and Pollard Rho Method for Factoring Integers." Lontar Komputer : Jurnal Ilmiah Teknologi Informasi 12, no. 1 (2021): 33. http://dx.doi.org/10.24843/lkjiti.2021.v12.i01.p04.
Full textNurullaev, Mirkhon. "ASSESSMENT OF CRYPTOGRAPHIC KEY GENERATION SYSTEMS USING DREAD AND STRIDE THREAT METHODOLOGIES." Techscience uz - Topical Issues of Technical Sciences 3, no. 3 (2025): 20–28. https://doi.org/10.47390/issn3030-3702v3i3y2025n03.
Full text