Journal articles on the topic 'Cryptography and Information Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cryptography and Information Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Tayyaba Sultana, Tayyaba Sultana. "Information Security with Cryptography." International Journal for Electronic Crime Investigation 2, no. 1 (2018): 6. http://dx.doi.org/10.54692/ijeci.2018.02019.
Full textShashi Raj K. "The Intersection of Algebra and Cryptography: Enhancing Information Security through Mathematical Foundations." Communications on Applied Nonlinear Analysis 31, no. 4s (2024): 466–89. http://dx.doi.org/10.52783/cana.v31.943.
Full textPrayoga, Estu. "PENGEMBANGAN SISTEM KEAMANAN INFORMASI BERKELANJUTAN DENGAN TEKNOLOGI KRIPTOGRAFI." Jurnal Sistem Informasi Kaputama (JSIK) 8, no. 2 (2024): 67–74. http://dx.doi.org/10.59697/jsik.v8i2.813.
Full textAnilkumar, Chunduru, Swathi Lenka, N. Neelima, and Sathishkumar V E. "A Secure Method of Communication Through BB84 Protocol in Quantum Key Distribution." Scalable Computing: Practice and Experience 25, no. 1 (2024): 21–33. http://dx.doi.org/10.12694/scpe.v25i1.2152.
Full textImai, Hideki. "Information security. 1. Information security and cryptography." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1285–90. http://dx.doi.org/10.3169/itej1978.42.1285.
Full textBanu, Anees. "Improved Algorithm of Steganography Combined with Cryptography." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 3793–804. http://dx.doi.org/10.22214/ijraset.2021.35792.
Full textPatel, Krisha. "Cryptography And Network Security." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem46815.
Full textVirk, Udayveer Singh, Devansh Verma, Gagandeep Singh, and Prof Sheetal Laroiya Prof. Sheetal Laroiya. "Analyzing Cryptographic Techniques and Machine Learning Algorithms for Crime Prediction." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem38099.
Full textSubhalaxmi Sabitri Das, Subhalaxmi Sabitri Das, Sachin Jena Sachin Jena, and H. Dipali Singh H.Dipali Singh. "The Role of Cryptography in Cyber Security." International Journal of Engineering and Science Invention 14, no. 5 (2025): 48–54. https://doi.org/10.35629/6734-14054854.
Full textKumar Bathala, Naresh, Naga Pawan YVR, Dhrubajyoti Choudhury, Ambika M, Kannadhasan S, and Padmavathy R. "Quantum Computing Paradigms Implications for Cryptography and Data Security in Information Systems." ITM Web of Conferences 76 (2025): 05005. https://doi.org/10.1051/itmconf/20257605005.
Full textLakshmi, Malyala Sravya, and Gadi Lava Raju. "A Comprehensive Study on Visual Cryptography." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 08 (2014): 1065–69. https://doi.org/10.5281/zenodo.14752169.
Full textShuxrat, Toirov Abduganiyevich, Eldor Islomovich Saidakhmedov, and X.U Akbarov. "Enhancing post-quantum security through hybrid cryptographic systems integrating quantum key distribution." Yashil iqtisodiyot va taraqqiyot 3, no. 2 (2025): 6–10. https://doi.org/10.5281/zenodo.14868992.
Full textDr., S.Rajendirakumar. "Quantum Mechanics for Secure Communication: The Promise of Quantum Cryptography." IJAPR Journal, UGC Indexed & Care Listed 6, no. 4 (2021): 370–75. https://doi.org/10.5281/zenodo.8196007.
Full textSantoso, Yogi Suryo. "Message Security Using a Combination of Hill Cipher and RSA Algorithms." Jurnal Matematika Dan Ilmu Pengetahuan Alam LLDikti Wilayah 1 (JUMPA) 1, no. 1 (2021): 20–28. http://dx.doi.org/10.54076/jumpa.v1i1.38.
Full textAlshar’e, Marwan, Sharf Alzu’bi, Ahed Al-Haraizah, Hamzah Ali Alkhazaleh, Malik Jawarneh, and Mohammad Rustom Al Nasar. "Elliptic curve cryptography based light weight technique for information security." Bulletin of Electrical Engineering and Informatics 14, no. 3 (2025): 2300–2308. https://doi.org/10.11591/eei.v14i3.8587.
Full textDr., Harshala B. Pethe*1 Varsha C. Pande2 &. Dr. Subhash R. Pande3. "PERFORMANCE ANALYSIS OF AES AND BLOWFISH CRYPTOGRAPHIC ALGORITHMS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES [NC-Rase 18] (November 12, 2018): 50–56. https://doi.org/10.5281/zenodo.1483995.
Full textTeja, Penumantra Satya Sai, Mounika Lakshmi P, and Vinay Kumar K. "A Secure Communication through Quantum Key Distribution Protocols." International Research Journal of Electronics and Computer Engineering 4, no. 3 (2018): 14. http://dx.doi.org/10.24178/irjece.2018.4.3.14.
Full textDewamuni, Zenith, Bharanidharan Shanmugam, Sami Azam, and Suresh Thennadil. "Bibliometric Analysis of IoT Lightweight Cryptography." Information 14, no. 12 (2023): 635. http://dx.doi.org/10.3390/info14120635.
Full textAnnu. "Algebraic Structures and Their Applications in Modern Cryptography." Innovative Research Thoughts 10, no. 3 (2024): 52–59. http://dx.doi.org/10.36676/irt.v10.i3.1433.
Full textSlashi Leel. "Graph - Based Innovations in Cryptographic Security." Communications on Applied Nonlinear Analysis 32, no. 7s (2025): 744–58. https://doi.org/10.52783/cana.v32.3480.
Full textSanchez-Reillo, R., C. Lopez-Ongil, L. Entrena-Arrontes, and C. Sanchez-Avila. "Information technology security using cryptography." IEEE Aerospace and Electronic Systems Magazine 18, no. 6 (2003): 21–24. http://dx.doi.org/10.1109/maes.2003.1209586.
Full textTuo, Zehao. "A comparative Analysis of AES and RSA algorithms and their integrated application." Theoretical and Natural Science 25, no. 1 (2023): 28–35. http://dx.doi.org/10.54254/2753-8818/25/20240893.
Full textPratarshi, Saha, Gurung Sandeep, and Krishanu Ghose Kunal. "HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 163–79. https://doi.org/10.5281/zenodo.4724281.
Full textK., Thamizhmaran. "Network Security Using Symmetric Cryptography." Journal of Recent Trends in Electrical Power System 8, no. 1 (2025): 36–46. https://doi.org/10.5281/zenodo.15210581.
Full textVenu, S. V. V. D., Didde Keerthika, Mavuri Rajasri, and Vanapalli Bhavani. "Enhancing Online Security Using Visual Cryptography: A Comprehensive Approach." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43553.
Full textGopal, S. V. V. D. Venu, Didde Keerthika, Mavuri Rajasri, Vanapalli Bhavani, and Chinnala SatyaUma. "Enhancing Online Security Using Visual Cryptography: A Comprehensive Approach." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43560.
Full textBharati A. Patil, Prajakta R. Toke, and Sharyu S. Naiknavare. "Research on Various Cryptography Techniques." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 2 (2024): 685–92. http://dx.doi.org/10.32628/cseit2410290.
Full textMmaduekwe, Ugochukwu, and Ebuka Mmaduekwe. "Cybersecurity and Cryptography: The New Era of Quantum Computing." Current Journal of Applied Science and Technology 43, no. 5 (2024): 41–51. http://dx.doi.org/10.9734/cjast/2024/v43i54377.
Full textDonia Fadil Chalob, Rusul Hussein Hasan, and Suaad M. Saber. "A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis." International Journal of Scientific Research in Science, Engineering and Technology 12, no. 1 (2025): 275–82. https://doi.org/10.32628/ijsrset25121171.
Full textQian, Yuling. "Application of modern algebra in cryptography." Theoretical and Natural Science 10, no. 1 (2023): 16–20. http://dx.doi.org/10.54254/2753-8818/10/20230304.
Full textSatapure, Pratiksha. "Different Methods of Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (2021): 170–77. http://dx.doi.org/10.22214/ijraset.2021.38732.
Full textSantosh, Mutnuru. "New Research Articles 2020 June Issue International Journal on Cryptography and Information Security (IJCIS)." International Journal on Cryptography and Information Security ( IJCIS) 10, no. 2 (2020): 1–7. https://doi.org/10.5281/zenodo.3925261.
Full textShahid, Ishaq, and Raj Rashmi. "Analyzing and Securing Data Transmission in Wireless Sensor Networks through Cryptography Techniques." International Journal of Trend in Scientific Research and Development 4, no. 3 (2020): 171–75. https://doi.org/10.5281/zenodo.3892475.
Full textKumar, Dr Vinod, Er Gagandeep Raheja, and Ms Subeena Sareen. "CRYPTOGRAPHY." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 1 (2013): 29–32. http://dx.doi.org/10.24297/ijct.v4i1a.3030.
Full textHafiz Nanda Ginting, Subhan, Muhammad Rhifky Wayahdi, and Surya Guntur. "Playfair Cipher Algorithm in Learning Media." Jurnal Minfo Polgan 11, no. 1 (2022): 9–14. http://dx.doi.org/10.33395/jmp.v11i1.11560.
Full textNadia Mustaqim Ansari, Talha Tariq, Rizwan Iqbal, Azhar Abbas, Haider Abbas, and Muhammad Mohsan Zohaib. "QUANTUM CRYPTOGRAPHY: SECURING DATA IN THE POST-QUANTUM COMPUTING ERA – A COMPREHENSIVE EXPLORATION OF THE FUTURE OF CYBERSECURITY." Kashf Journal of Multidisciplinary Research 2, no. 02 (2025): 28–43. https://doi.org/10.71146/kjmr259.
Full textAnilkumar, Chunduru, Bhavani Gorle, and Kinthali Sowmya. "A Secure Method of Communication in Conventional Cryptography using Quantum Key Distribution." Applied and Computational Engineering 8, no. 1 (2023): 68–73. http://dx.doi.org/10.54254/2755-2721/8/20230083.
Full textHimmat Rathore. "Next-generation cryptographic techniques for robust network security." World Journal of Advanced Research and Reviews 11, no. 3 (2021): 496–508. https://doi.org/10.30574/wjarr.2021.11.3.0413.
Full textBudi, Sarwo, Arif Budimansyah Purba, and Jajang Mulyana. "PENGAMANAN FILE DOKUMEN MENGGUNAKAN KOMBINASI METODE SUBTITUSI DAN VIGENERE CIPHER." ILKOM Jurnal Ilmiah 11, no. 3 (2019): 222–30. http://dx.doi.org/10.33096/ilkom.v11i3.477.222-230.
Full textBERESTNEV, MIKHAIL, ALEXEY MINBALEEV, and KIRILL EVSIKOV. "ENSURING INFORMATION SECURITY OF MINING EQUIPMENT IN THE QUANTUM ERA." News of the Tula state university. Sciences of Earth 1, no. 1 (2023): 567–84. http://dx.doi.org/10.46689/2218-5194-2023-1-1-567-584.
Full textRaut, Kinjal. "A Comprehensive Review of Cryptographic Algorithms." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 1750–56. http://dx.doi.org/10.22214/ijraset.2021.39581.
Full textKabeaken, Syariah, and Imam Saputra. "Perancangan Aplikasi Enkripsi Pada File Teks Menggunakan Algoritma Spritz." JURIKOM (Jurnal Riset Komputer) 7, no. 3 (2020): 353. http://dx.doi.org/10.30865/jurikom.v7i3.2125.
Full textNanda, Nanda Amalya, Santa Maria Sopiana Silalahi, Della Fatricia Nasution, Melia Sari, and Indra Gunawan. "Kriptografi dan Penerapannya Dalam Sistem Keamanan Data." Jurnal Media Informatika 4, no. 2 (2023): 90–93. http://dx.doi.org/10.55338/jumin.v4i2.428.
Full textDandy Duggari Manik and Ramos Somya. "DESIGNING 64-BIT BLOCK CIPHER CRYPTOGRAPHY BASED ON THE PATTERN OF ONE OF KARO'S TRADITIONAL CLOTHS." Jurnal Teknik Informatika (Jutif) 5, no. 4 (2024): 157–61. https://doi.org/10.52436/1.jutif.2024.5.4.2137.
Full textDayo Alowolodu, Olufunso, Gabriel K Adelaja, Boniface K Alese, and Olufunke Catherine Olayemi. "Medical Image Security Using Quantum Cryptography." Issues in Informing Science and Information Technology 15 (2018): 057–67. http://dx.doi.org/10.28945/4008.
Full textAkram, Zaryab. "Cryptology Based on Laplace Transform of Hyperbolic Function and Matrix Decomposition Method." ECS Meeting Abstracts MA2022-02, no. 64 (2022): 2364. http://dx.doi.org/10.1149/ma2022-02642364mtgabs.
Full textSinghal, Yash, Adwit Agarwal, Shivank Mittal, Shristi Katyayani, and Amit Sharma. "Database Security using Cryptography." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 582–87. http://dx.doi.org/10.22214/ijraset.2022.43621.
Full textWidiarsana, Made Ari, I. Gusti Ngurah Anom Cahyadi Putra, I. Ketut Gede Suhartana, Luh Gede Astuti, I. Putu Gede Hendra Suputra, and I. Wayan Supriana. "Aplikasi Website Pengamanan File Dokumen Menggunakan Kriptografi RSA." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 11, no. 1 (2022): 33. http://dx.doi.org/10.24843/jlk.2022.v11.i01.p04.
Full textDhea Agustina Akmal, Dicha Mutia Dhani, and Febby Syahila. "Kombinasi Kriptografi Modern Dalam Keamanan Pesan Teks." Saturnus : Jurnal Teknologi dan Sistem Informasi 2, no. 3 (2024): 119–28. http://dx.doi.org/10.61132/saturnus.v2i3.204.
Full textMs., A. A. Deshmukh, Manali Dubal Ms., Mahesh TR Dr., and C. R. Chauhan Mr. "DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD." International Journal of Advanced Information Technology (IJAIT) 2, no. 2 (2012): 41–57. https://doi.org/10.5281/zenodo.3534867.
Full text