Contents
Academic literature on the topic 'Cryptographie logicielle'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cryptographie logicielle.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Dissertations / Theses on the topic "Cryptographie logicielle"
Vollmer, Morgane. "Contributions à l'arithmétique RNS pour la cryptographie logicielle." Electronic Thesis or Diss., Brest, 2024. http://www.theses.fr/2024BRES0122.
Full textRyckeghem, Jocelyn. "Cryptographie post-quantique : conception et analyse en cryptographie multivariée." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS577.
Full textGalissant, Pierre. "Contributions to white-box cryptography : models and algebraic constructions." Electronic Thesis or Diss., université Paris-Saclay, 2023. http://www.theses.fr/2023UPASG099.
Full textRasoamanana, Aina Toky. "Derivation and Analysis of Cryptographic Protocol Implementation." Electronic Thesis or Diss., Institut polytechnique de Paris, 2023. http://www.theses.fr/2023IPPAS005.
Full textLestringant, Pierre. "Identification d'algorithmes cryptographiques dans du code natif." Thesis, Rennes 1, 2017. http://www.theses.fr/2017REN1S067/document.
Full textScerri, Guillaume. "Proof of security protocols revisited." Thesis, Cachan, Ecole normale supérieure, 2015. http://www.theses.fr/2015DENS0002/document.
Full textZucca, Vincent. "Towards efficient arithmetic for Ring-LWE based homomorphic encryption." Electronic Thesis or Diss., Sorbonne université, 2018. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2018SORUS080.pdf.
Full textCornelie, Marie-Angela. "Implantations et protections de mécanismes cryptographiques logiciels et matériels." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM029/document.
Full textGodquin, Tanguy. "Sécurisation adaptative des objets de l'IoT par méthodes logicielles (White box) et combinées (hardware et software)." Thesis, Normandie, 2020. http://www.theses.fr/2020NORMC222.
Full textCalvet, Joan. "Analyse dynamique de logiciels malveillants." Electronic Thesis or Diss., Université de Lorraine, 2013. http://www.theses.fr/2013LORR0083.
Full textBooks on the topic "Cryptographie logicielle"
Lucas, Michael. PGP & GPG: Assurer la confidentialite de son courrier e lectronique. E ditions Eyrolles, 2006.
Find full textLucas, Michael. PGP & GPG: Email for the practical paranoid. No Starch Press, 2006.
Find full textLucas, Michael. PGP & GPG: Assurer la confidentialité de son courrier électronique. Eyrolles, 2006.
Find full textFaith, Cranor Lorrie, and Garfinkel Simson, eds. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly, 2005.
Find full textMcAndrew, Alasdair. Introduction to Cryptography with Open-Source Software. Taylor & Francis Group, 2016.
Find full textCranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems that People Can Use. O'Reilly Media, Inc., 2005.
Find full textCranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
Find full textCranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
Find full text