Academic literature on the topic 'Cryptographic libraries'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cryptographic libraries.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cryptographic libraries"
Duka, Mariusz. "ELLIPTIC-CURVE CRYPTOGRAPHY (ECC) AND ARGON2 ALGORITHM IN PHP USING OPENSSL AND SODIUM LIBRARIES." Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 10, no. 3 (2020): 91–94. http://dx.doi.org/10.35784/iapgos.897.
Full textIrazoqui, Gorka, Mehmet Sinan IncI, Thomas Eisenbarth, and Berk Sunar. "Know Thy Neighbor: Crypto Library Detection in Cloud." Proceedings on Privacy Enhancing Technologies 2015, no. 1 (2015): 25–40. http://dx.doi.org/10.1515/popets-2015-0003.
Full textShaik, Cheman. "Preventing Counterfeit Products using Cryptography, QR Code and Webservice." Computer Science & Engineering: An International Journal 11, no. 1 (2021): 1–11. http://dx.doi.org/10.5121/cseij.2021.11101.
Full textNazaruk, Vladislav, and Pavel Rusakov. "Implementation of Cryptographic Algorithms in Software: An Analysis of the Effectiveness." Scientific Journal of Riga Technical University. Computer Sciences 41, no. 1 (2010): 97–105. http://dx.doi.org/10.2478/v10143-010-0030-x.
Full textCASSIA, RICARDO F., VLADIMIR C. ALVES, FEDERICO G. D. BESNARD, and FELIPE M. G. FRANÇA. "SYNCHRONOUS-TO-ASYNCHRONOUS CONVERSION OF CRYPTOGRAPHIC CIRCUITS." Journal of Circuits, Systems and Computers 18, no. 02 (2009): 271–82. http://dx.doi.org/10.1142/s0218126609005058.
Full textZhdanovа, Yulia, Svitlana Spasiteleva, and Svitlana Shevchenko. "APPLICATION OF THE SECURITY.CRYPTOGRAPHY CLASS LIBRARY FOR PRACTICAL TRAINING OF SPECIALISTS FROM THE CYBER SECURITY." Cybersecurity: Education Science Technique, no. 4 (2019): 44–53. http://dx.doi.org/10.28925/2663-4023.2019.4.4453.
Full textShah, Yasir A., Khalid Javeed, Shoaib Azmat, and Xiaojun Wang. "Redundant-Signed-Digit-Based High Speed Elliptic Curve Cryptographic Processor." Journal of Circuits, Systems and Computers 28, no. 05 (2019): 1950081. http://dx.doi.org/10.1142/s0218126619500816.
Full textSWAMY, NIKHIL, JUAN CHEN, CÉDRIC FOURNET, PIERRE-YVES STRUB, KARTHIKEYAN BHARGAVAN, and JEAN YANG. "Secure distributed programming with value-dependent types." Journal of Functional Programming 23, no. 4 (2013): 402–51. http://dx.doi.org/10.1017/s0956796813000142.
Full textKuykendall, Benjamin, Hugo Krawczyk, and Tal Rabin. "Cryptography for #MeToo." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (2019): 409–29. http://dx.doi.org/10.2478/popets-2019-0054.
Full textFerreira, Maurício J., Nuno A. Silva, Armando N. Pinto, and Nelson J. Muga. "Characterization of a Quantum Random Number Generator Based on Vacuum Fluctuations." Applied Sciences 11, no. 16 (2021): 7413. http://dx.doi.org/10.3390/app11167413.
Full textDissertations / Theses on the topic "Cryptographic libraries"
Brychta, Josef. "Srovnání kryptografických primitiv využívajících eliptických křivek na různých hardwarových platformách." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-376973.
Full textChadim, Pavel. "Zabezpečení komunikace a ochrana dat v Internetu věcí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-377025.
Full textFernandes, Nuno Filipe Trovisco. "Cryptographic library support for a certified compiler." Master's thesis, 2014. http://hdl.handle.net/1822/37511.
Full textBooks on the topic "Cryptographic libraries"
Book chapters on the topic "Cryptographic libraries"
Braga, Alexandre M., and Erick N. Nascimento. "Portability Evaluation of Cryptographic Libraries on Android Smartphones." In Cyberspace Safety and Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35362-8_34.
Full textVanspauwen, Gijs, and Bart Jacobs. "Verifying Protocol Implementations by Augmenting Existing Cryptographic Libraries with Specifications." In Software Engineering and Formal Methods. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-22969-0_4.
Full textMihailescu, Marius Iulian, and Stefania Loredana Nita. "Cryptography Libraries in C# and .NET." In Pro Cryptography and Cryptanalysis. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6367-9_9.
Full textMihailescu, Marius Iulian, and Stefania Loredana Nita. "Cryptography Libraries in C/C++20." In Pro Cryptography and Cryptanalysis with C++20. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6586-4_8.
Full textCabiddu, Giovanni, Antonio Lioy, and Gianluca Ramunno. "Building a Trusted Environment for Security Applications." In Theory and Practice of Cryptography Solutions for Secure Information Systems. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-4030-6.ch014.
Full textSingh, Amit Kumar, Basant Kumar, Mayank Dave, Satya Prakash Ghrera, and Anand Mohan. "Digital Image Watermarking." In Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0105-3.ch011.
Full textOmame, Isaiah Michael, and Juliet C. Alex-Nmecha. "Application of Blockchain in Libraries and Information Centers." In Advances in Library and Information Science. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7258-0.ch020.
Full textConference papers on the topic "Cryptographic libraries"
Naser, Abu, Mohsen Gavahi, Cong Wu, Viet Tung Hoang, Zhi Wang, and Xin Yuan. "An Empirical Study of Cryptographic Libraries for MPI Communications." In 2019 IEEE International Conference on Cluster Computing (CLUSTER). IEEE, 2019. http://dx.doi.org/10.1109/cluster.2019.8891033.
Full textNemec, Matus, Dusan Klinec, Petr Svenda, Peter Sekan, and Vashek Matyas. "Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans." In ACSAC 2017: 2017 Annual Computer Security Applications Conference. ACM, 2017. http://dx.doi.org/10.1145/3134600.3134612.
Full textAlrowaithy, Majed, and Nigel Thomas. "Investigating the Performance of C and C++ Cryptographic Libraries." In VALUETOOLS 2019: 12th EAI International Conference on Performance Evaluation Methodologies and Tools. ACM, 2019. http://dx.doi.org/10.1145/3306309.3306335.
Full textRuica, Elena-Cristina, Mihai-Lica Pura, and Iulian Aciobanitei. "Implementing Cloud Qualified Electronic Signatures for Documents using Available Cryptographic Libraries: A Survey." In 2020 13th International Conference on Communications (COMM). IEEE, 2020. http://dx.doi.org/10.1109/comm48946.2020.9141971.
Full textTsantekidis, Marinos, and Vassilis Prevelakis. "MMU-based Access Control for Libraries." In 18th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010536706860691.
Full textLim, Jay P., and Santosh Nagarakatte. "Automatic Equivalence Checking for Assembly Implementations of Cryptography Libraries." In 2019 IEEE/ACM International Symposium on Code Generation and Optimization (CGO). IEEE, 2019. http://dx.doi.org/10.1109/cgo.2019.8661180.
Full text"AN E-LIBRARIAN SERVICE THAT YIELDS PERTINENT RESOURCES FROM A MULTIMEDIA KNOWLEDGE BASE." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2006. http://dx.doi.org/10.5220/0001571302080215.
Full text