Academic literature on the topic 'Cryptographie (Informatique)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cryptographie (Informatique).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cryptographie (Informatique)"
Guru, Abhishek, Bhabendu Kumar Mohanta, Hitesh Mohapatra, Fadi Al-Turjman, Chadi Altrjman, and Arvind Yadav. "A Survey on Consensus Protocols and Attacks on Blockchain Technology." Applied Sciences 13, no. 4 (2023): 2604. http://dx.doi.org/10.3390/app13042604.
Full textBali, Anand, Saud Ansari, Kalim Khan, and Wasif Shaikh. "Securing Informative Text using Color Visual Cryptography." International Journal of Computer Applications 136, no. 5 (2016): 30–33. http://dx.doi.org/10.5120/ijca2016908418.
Full textIbrаhimov, Bayram G., Allahverdi O. Orujov, Arif H. Hasanov, and Konul M. Tahirova. "Research and analysis efficiency fiber optical communication lines using quantum technology." T-Comm 15, no. 10 (2021): 50–54. http://dx.doi.org/10.36724/2072-8735-2021-15-10-50-54.
Full textReiter, Jerome P. "Differential Privacy and Federal Data Releases." Annual Review of Statistics and Its Application 6, no. 1 (2019): 85–101. http://dx.doi.org/10.1146/annurev-statistics-030718-105142.
Full textDemirci, Musa, and Ismail Naci Cangul. "Tribonacci graphs." ITM Web of Conferences 34 (2020): 01002. http://dx.doi.org/10.1051/itmconf/20203401002.
Full textPerin, Guilherme, Lichao Wu, and Stjepan Picek. "The Need for Speed: A Fast Guessing Entropy Calculation for Deep Learning-Based SCA." Algorithms 16, no. 3 (2023): 127. http://dx.doi.org/10.3390/a16030127.
Full textГаврилов, Дмитро Сергійович, Сергій Степанович Бучік, Юрій Михайлович Бабенко, Сергій Сергійович Шульгін та Олександр Васильович Слободянюк. "Метод обробки вiдеодaних з можливістю їх захисту після квaнтувaння". RADIOELECTRONIC AND COMPUTER SYSTEMS, № 2 (2 червня 2021): 64–77. http://dx.doi.org/10.32620/reks.2021.2.06.
Full textIbrahimov, B. G., and K. M. Tahirova. "RESEARCH EFFICIENCY OF STEGANOGRAPHIC SYSTEMS IN EMBEDDING OR EXTRACTING HIDDEN INFORMATION." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 221 (November 2022): 45–51. http://dx.doi.org/10.14489/vkit.2022.11.pp.045-051.
Full text-, Elias Semajeri Ladislas. "Analyse Des Applications De La Théorie Des Groupes En Cryptographie Pour La Sécurisation Des Communications Dans Un Réseau Informatique." International Journal For Multidisciplinary Research 5, no. 6 (2023). http://dx.doi.org/10.36948/ijfmr.2023.v05i06.9016.
Full textГнатюк, Сергій Олександрович, Василь Миколайович Кінзерявий, Берік Бахитжанович Ахметов, Каріна Сергіївна Кириченко, and Кирило Петрович Ануфрієнко. "Cryptographic method of defence of critical aviation informative systems." Ukrainian Information Security Research Journal 19, no. 3 (2017). http://dx.doi.org/10.18372/2410-7840.19.11903.
Full textDissertations / Theses on the topic "Cryptographie (Informatique)"
Minaud, Brice. "Analyse de primitives cryptographiques récentes." Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1S066/document.
Full textTillich, Jean-Pierre. "Fonctions de hachage pour la cryptographie." Paris : Ecole nationale supérieure des Télécommunications, 1994. http://catalogue.bnf.fr/ark:/12148/cb35723458t.
Full textBesson, Loïc. "Design, analysis and implementation of cryptographic symmetric encryption algorithms on FPGA." Electronic Thesis or Diss., université Paris-Saclay, 2021. http://www.theses.fr/2021UPASG104.
Full textPaindavoine, Marie. "Méthodes de calculs sur les données chiffrées." Thesis, Lyon, 2017. http://www.theses.fr/2017LYSE1009/document.
Full textZuber, Martin. "Contributions to data confidentiality in machine learning by means of homomorphic encryption." Electronic Thesis or Diss., université Paris-Saclay, 2020. http://www.theses.fr/2020UPASG048.
Full textCasile, Jean-François. "Le code pénal à l'épreuve de la délinquance informatique." Amiens, 2001. http://www.theses.fr/2001AMIE0053.
Full textTarento, Sabrina. "Formalisation en Coq de modèles cryptographiques idéalisés et application au cryptosystème ElGamal." Nice, 2006. http://www.theses.fr/2006NICE4081.
Full textRöck, Andrea. "Etudes quantitatives des générateurs de nombres (pseudo) aléatoires pour la cryptologie." Palaiseau, Ecole polytechnique, 2009. http://www.theses.fr/2009EPXX0014.
Full textAyadi, Marc Mehdi. "Vérification de protocoles cryptographiques : logiques et méthodes formelles dans l'environnement de preuves coq." Paris 9, 1998. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=1998PA090040.
Full textDugardin, Margaux. "Amélioration d'attaques par canaux auxiliaires sur la cryptographie asymétrique." Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0035.
Full textBooks on the topic "Cryptographie (Informatique)"
Joe, Kilian, ed. Theory of cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005 : proceedings. Springer, 2005.
Find full textKlima, Richard E. Cryptology: Classical and modern with maplets. Taylor & Francis, 2012.
Find full textCRYPTO (Conference) (1992 Santa Barbara, Calif.). Advances in cryptology--CRYPTO '92: 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992 : proceedings. Springer-Verlag, 1993.
Find full textSchneier, Bruce. Cryptographie appliquée: Protocoles, algorithmes et codes sources en C. 2nd ed. Vuibert, 2001.
Find full textBauer, Friedrich Ludwig. Decrypted secrets: Methods and maxims of cryptology. Springer, 1997.
Find full text1968-, Blundo Carlo, and Cimato Stelvio, eds. Security in communication networks: 4th international conference, SCN 2004, Amalfi, Italy, September 8-10, 2004 : revised selected papers. Springer, 2005.
Find full textCramer, Ronald John Fitzgerald. Modular design of secure yet practical cryptographic protocols. s.n., 1997.
Find full textConference papers on the topic "Cryptographie (Informatique)"
Chavan, P. V., and R. S. Mangrulkar. "Encrypting Informative Color Image Using Color Visual Cryptography." In Third International Conference on Emerging Trends in Engineering and Technology (ICETET 2010). IEEE, 2010. http://dx.doi.org/10.1109/icetet.2010.94.
Full text