Academic literature on the topic 'Cryptography – Research'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cryptography – Research.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cryptography – Research"

1

Irawan, Muhammad Dedi. "IMPLEMENTASI KRIPTOGRAFI VIGENERE CIPHER DENGAN PHP." JURNAL TEKNOLOGI INFORMASI 1, no. 1 (2017): 11. http://dx.doi.org/10.36294/jurti.v1i1.21.

Full text
Abstract:
Abstract - This research was conducted to create a cryptographic implementation of vigenere ciphers. This system is designed by analyzing the descriptive method, and the comparative method. After analysis, modeling is done with UML (Unified Modeling Language) and the design of vigenere cipher cryptography system with text encryption and decryption can be programmed using PHP software. The results of this study are an implementation of the vigenere cipher cryptographic system with PHP. Keywords - Cryptography, Vigenere Cipher, Encryption - Decryption, Text, PHP.
APA, Harvard, Vancouver, ISO, and other styles
2

Xu, Shu, Xiaoming Chen, and Xinhai Tong. "Advances in superlattice cryptography research." Chinese Science Bulletin 65, no. 2-3 (2020): 108–16. http://dx.doi.org/10.1360/tb-2019-0291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saha, Rahul, G. Geetha, Gulshan Kumar, and Hye-Jim Kim. "Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations." International Journal of Grid and Distributed Computing 10, no. 11 (2017): 79–98. http://dx.doi.org/10.14257/ijgdc.2017.10.11.08.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wagh, Sameer, Xi He, Ashwin Machanavajjhala, and Prateek Mittal. "DP-cryptography." Communications of the ACM 64, no. 2 (2021): 84–93. http://dx.doi.org/10.1145/3418290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

ZHANG, Fu-Tai, Yin-Xia SUN, Lei ZHANG, Man-Man GENG, and Su-Juan LI. "Research on Certificateless Public Key Cryptography." Journal of Software 22, no. 6 (2011): 1316–32. http://dx.doi.org/10.3724/sp.j.1001.2011.04007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dumé, Belle, and Matin Durrani. "Quantum-cryptography research scoops Descartes prize." Physics World 18, no. 1 (2005): 5. http://dx.doi.org/10.1088/2058-7058/18/1/5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

HOOBI, Mays M. "SURVEY: EFFICIENT HYBRID ALGOR ITHMS OF CRYPTOGRAPHY." MINAR International Journal of Applied Sciences and Technology 2, no. 4 (2020): 1–16. http://dx.doi.org/10.47832/2717-8234.4-2.1.

Full text
Abstract:
Day after day, the digital data sizes undergo rapid increases over Internet, it is significant; the data shouldn’t be accessed by the unauthorized users. The attackers attempt at accessing those sensitive part of the data. There is a necessity for the prevention of the unauthorized access of the data and guarantee the secure data exchange. A variety of the cryptographic approaches have been used for the conversion of the secret data of the users into secure ciphertext formats. The cryptographic methods have been based on, private and public keys. The researchers have worked on the efficient an
APA, Harvard, Vancouver, ISO, and other styles
8

Knudsen, Jonathan. "Java Cryptography." EDPACS 27, no. 4 (1999): 16. http://dx.doi.org/10.1201/1079/43250.27.4.19991001/30275.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

kumar, N. Shantha, and Dr Hareesh K. "A Primitive Proposal of an Algorithm for IP and Mac Based Data Aggregation and message authentication in Wireless Sensor Networks." International Journal of Soft Computing and Engineering 9, no. 4 (2019): 14–17. http://dx.doi.org/10.35940/ijsce.c3322.109119.

Full text
Abstract:
In wireless sensor networks(WSN) ,authentication of messages is the highly important function in preventing threats from un wanted , un authorized and corrupt messages from being sent. There are various message verification and authentication methods have been proposed as well as developed based on cryptography technology such as symmetric key cryptographic systems or public-key cryptographic systems. Also there are many different techniques available based on polynomial-based schemes, elliptic curve cryptography (ECC) and so on. All the above said methods have its own merits and demerits. In
APA, Harvard, Vancouver, ISO, and other styles
10

Hryshchuk, Ruslan, and Olga Hryshchuk. "A GENERALIZED MODEL OF FREDHOLM'S CRYPTOSYSTEM." Cybersecurity: Education Science Technique, no. 4 (2019): 14–23. http://dx.doi.org/10.28925/2663-4023.2019.4.1423.

Full text
Abstract:
The problem of cyber security in the era of the creation of quantum computers is of particular relevance. Specifically, the data are at risk which are confidential or whose value depends on their integrity. In order to find a way out of the situation which happened in the article, a thorough comprehensive analysis of the current state of the known cryptosystems was carried out, based on a systematic approach. In particular, the advantages and disadvantages of models of cryptosystems which were created on the basis of cognitive cryptography are stated, the theory of dynamic chaos, constructive,
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cryptography – Research"

1

Mefford, Greg. "Side Channel Analysis Research Framework (SCARF)." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1342463791.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Meihong, Li, Zhang Qishan, and Wang Jun. "RESEARCH AND IMPLEMENTATION OF MOBILE BANK BASED ON SSL." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/605837.

Full text
Abstract:
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada<br>SSL protocol is one industrial standard to protect data transferred securely on Internet. Firstly SSL is analyzed, according to its characteristics, one solution plan on mobile bank based on SSL is proposed and presented, in which GPRS technology is adopted and elliptic curve algorithm is used for the session key, finally several functional modules of mobile bank are designed in details and its security is analyzed.
APA, Harvard, Vancouver, ISO, and other styles
3

Deligne, Eddy. "Hyperviseur de protection d'exécutables - Etude, développement et discussion." Phd thesis, Ecole Polytechnique X, 2014. http://pastel.archives-ouvertes.fr/pastel-00976713.

Full text
Abstract:
Pour garantir la pérennité de l'entreprise, celle-ci doit souvent chercher des contrats à l'export. Dans le domaine de la Défense, ces contrats s'accompagnent souvent de transferts de technologie (ToT) vers le pays acquéreur. Ceux-ci sont partiels et un compromis est nécessaire entre la protection de la propriété industrielle, celle du secret national et les demandes du client. C'est dans ce contexte, et notamment au sein de DCNS que nous cherchons de nouvelles techniques de protection logicielles. Face aux échecs des différentes techniques de protections actuelles (obfuscations et packer) qui
APA, Harvard, Vancouver, ISO, and other styles
4

Moulianitakis, Feidias, and Konstantinos Asimakopoulos. "Benchmarking Framework for Transparent Data Encryption Systems." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75814.

Full text
Abstract:
In the digital world of today, information is always at risk regardless of its state, at rest or in transit. Cryptography is the technology that promises to address the security issues that emerge. Hence, it was a reasonable consequence to introduce cryptography to databases. However, manually encrypting and decrypting data along with the key management is a burden for the regular user of a database. The need for removing this burden gave birth to Transparent Data Encryption (TDE).   TDE technology is widely available nowadays and a number of vendors have developed their own solutions for prot
APA, Harvard, Vancouver, ISO, and other styles
5

Gutmann, Peter. "The Design and Verification of a Cryptographic Security Architecture." Thesis, University of Auckland, 2000. http://hdl.handle.net/2292/2310.

Full text
Abstract:
A cryptographic security architecture constitutes the collection of hardware and software which protects and controls the use of encryption keys and similar cryptovariables. This thesis presents a design for a portable, flexible high-security architecture based on a traditional computer security model. Behind the API it consists of a kernel implementing a reference monitor which controls access to security-relevant objects and attributes based on a configurable security policy. Layered over the kernel are various objects which abstract core functionality such as encryption and digital signatur
APA, Harvard, Vancouver, ISO, and other styles
6

Pfennig, Stefan, and Elke Franz. "Comparison of Different Secure Network Coding Paradigms Concerning Transmission Efficiency." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-145096.

Full text
Abstract:
Preventing the success of active attacks is of essential importance for network coding since even the infiltration of one single corrupted data packet can jam large parts of the network. The existing approaches for network coding schemes preventing such pollution attacks can be divided into two categories: utilize cryptographic approaches or utilize redundancy similar to error correction coding. Within this paper, we compared both paradigms concerning efficiency of data transmission under various circumstances. Particularly, we considered an attacker of a certain strength as well as the influe
APA, Harvard, Vancouver, ISO, and other styles
7

Pfennig, Stefan, and Elke Franz. "Comparison of Different Secure Network Coding Paradigms Concerning Transmission Efficiency." Technische Universität Dresden, 2013. https://tud.qucosa.de/id/qucosa%3A28134.

Full text
Abstract:
Preventing the success of active attacks is of essential importance for network coding since even the infiltration of one single corrupted data packet can jam large parts of the network. The existing approaches for network coding schemes preventing such pollution attacks can be divided into two categories: utilize cryptographic approaches or utilize redundancy similar to error correction coding. Within this paper, we compared both paradigms concerning efficiency of data transmission under various circumstances. Particularly, we considered an attacker of a certain strength as well as the influe
APA, Harvard, Vancouver, ISO, and other styles
8

Dyer, Kevin Patrick. "Novel Cryptographic Primitives and Protocols for Censorship Resistance." PDXScholar, 2015. https://pdxscholar.library.pdx.edu/open_access_etds/2489.

Full text
Abstract:
Internet users rely on the availability of websites and digital services to engage in political discussions, report on newsworthy events in real-time, watch videos, etc. However, sometimes those who control networks, such as governments, censor certain websites, block specific applications or throttle encrypted traffic. Understandably, when users are faced with egregious censorship, where certain websites or applications are banned, they seek reliable and efficient means to circumvent such blocks. This tension is evident in countries such as a Iran and China, where the Internet censorship infr
APA, Harvard, Vancouver, ISO, and other styles
9

Chaffe, Tomas. "The Secret Writer." Thesis, Konstfack, Institutionen för Konst (K), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:konstfack:diva-3980.

Full text
Abstract:
This essay reflects a particular method and way of working that I employ when undertaking artistic research. My artworks are rooted and develop from the situation I find myself in as an artist, the very context I exhibit the work within. I do this by trying to understand this position, both on the micro and macro scale. As an artist currently studying at—and subsequently exhibiting in relation to— Konstfack, I base my research with the physical manifestation of the school. An imposing building that was part of a huge headquarters and factory site for the telecommunication company, Ericsson, in
APA, Harvard, Vancouver, ISO, and other styles
10

Fujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.

Full text
Abstract:
Telemetry system, Optimisation, Sensoric networks, Smart Grid, Internet of Things, Sensors, Information security, Cryptography, Cryptography algorithms, Cryptosystem, Confidentiality, Integrity, Authentication, Data freshness, Non-Repudiation.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cryptography – Research"

1

Symposium on State and Progress of Research in Cryptography (3rd 1993 Rome, Italy). Proceedings of the 3rd Symposium on State and Progress of Research in Cryptography: Rome, Italy, February 15-16, 1993 : SPRC '93. Fondazione Ugo Bordoni, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Boolean functions in coding theory and cryptography. American Mathematical Society, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dam, Kenneth W. The role of private groups in public policy: Cryptography and the National Research Council. Law School, the University of Chicago, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Western, European Workshop on Research in Cryptology (2007 :. Bochum Germany). Research in cryptology: Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, revised selected papers. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stefan, Lucks, Sadeghi Ahmad-Reza, and Wolf Christopher, eds. Research in cryptology: Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, revised selected papers. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Western European Workshop on Research in Cryptology (2007 : Bochum, Germany). Research in cryptology: Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, revised selected papers. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sexton, Donal J. Signals intelligence in World War II: A research guide. Greenwood Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Linear A and Cypro-Minoan in the light of heuristics and cryptology: A research report. B.Z. Szałek, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Forschung, Rüstung und Krieg: Formen, Ausmass und Grenzen des Wissenschaftlereinsatzes für den Zweiten Weltkrieg im Deutschen Reich. Books on Demand, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

1951-, Chadwick David, Zhao Gansen, and LINK (Online service), eds. Public key infrastructure: Second European PKI Workshop : Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005 : proceedings. Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cryptography – Research"

1

Aycock, John, and John Sullins. "Ethical Proactive Threat Research." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14992-4_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cairns, Kelsey, Harry Halpin, and Graham Steel. "Security Analysis of the W3C Web Cryptography API." In Security Standardisation Research. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49100-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Moore, Tyler, and Richard Clayton. "Ethical Dilemmas in Take-Down Research." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29889-9_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Desmedt, Yvo. "Some recent research aspects of threshold cryptography." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0030418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shou, Darren. "Ethical Considerations of Sharing Data for Cybersecurity Research." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29889-9_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kalra, Sheetal, and Sandeep K. Sood. "Elliptic Curve Cryptography: Current Status and Research Challenges." In High Performance Architecture and Grid Computing. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22577-2_62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

West, Andrew G., Pedram Hayati, Vidyasagar Potdar, and Insup Lee. "Spamming for Science: Active Measurement in Web 2.0 Abuse Research." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34638-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Calmels, Benoît, Sébastien Canard, Marc Girault, and Hervé Sibert. "Low-Cost Cryptography for Privacy in RFID Systems." In Smart Card Research and Advanced Applications. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11733447_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wenger, Erich, and Mario Werner. "Evaluating 16-Bit Processors for Elliptic Curve Cryptography." In Smart Card Research and Advanced Applications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-27257-8_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Woodbury, Adam D., Daniel V. Bailey, and Christof Paar. "Elliptic Curve Cryptography on Smart Cards without Coprocessors." In Smart Card Research and Advanced Applications. Springer US, 2000. http://dx.doi.org/10.1007/978-0-387-35528-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cryptography – Research"

1

Tsoupikova, Daria, Rong Zeng, Vera Pless, and Janet Beissinger. "Cryptography and mathematics." In ACM SIGGRAPH 2006 Research posters. ACM Press, 2006. http://dx.doi.org/10.1145/1179622.1179668.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vlahek, Dino. "The problem of quantum computers in cryptography and post-quantum cryptography." In StuCoSReC. 5th Student Computer Science Research Conference. University of Primorska Press, 2010. http://dx.doi.org/10.26493/978-961-7055-26-9.61-64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shanmugasundari, T., Ravi Subban, Saraswathi Shanmugamoorthy, and S. Manogari. "Research on Visual Cryptography Methods." In 2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). IEEE, 2017. http://dx.doi.org/10.1109/iccic.2017.8524449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Goel, Rajni, Moses Garuba, and Anteneh Girma. "Research Directions in Quantum Cryptography." In Fourth International Conference on Information Technology (ITNG'07). IEEE, 2007. http://dx.doi.org/10.1109/itng.2007.166.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fu, Zhengxin, and Bin Yu. "Research on Rotation Visual Cryptography Scheme." In 2009 International Symposium on Information Engineering and Electronic Commerce. IEEE, 2009. http://dx.doi.org/10.1109/ieec.2009.118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Diez Jimenez, Efren, and Miriam Martínez-Muñoz. "MATH LEARNING THROUGH CLASSIC CRYPTOGRAPHY." In 11th annual International Conference of Education, Research and Innovation. IATED, 2018. http://dx.doi.org/10.21125/iceri.2018.2359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Harkanson, R., and Y. Kim. "Applications of elliptic curve cryptography." In CISRC'17: Twelfth Annual Cyber and Information Security Research Conference. ACM, 2017. http://dx.doi.org/10.1145/3064814.3064818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lei, Sun, Wang Zewu, Zhao Kun, Sun Ruichen, and Li Shuai. "Research and design of cryptography cloud framework." In 2018 IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA). IEEE, 2018. http://dx.doi.org/10.1109/icccbda.2018.8386503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hu, Dong, and YuYan Wang. "Security Research on WiMAX with Neural Cryptography." In 2008 International Conference on Information Security and Assurance ISA. IEEE, 2008. http://dx.doi.org/10.1109/isa.2008.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Qu, Yingjie, and Zhengming Hu. "Research and design of elliptic curve cryptography." In 2010 2nd International Conference on Future Computer and Communication. IEEE, 2010. http://dx.doi.org/10.1109/icfcc.2010.5497370.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cryptography – Research"

1

Mizuochi, Norikazu. Research on Electrically Driven Single Photon Emitter by Diamond for Quantum Cryptography. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ada626179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Taiber, Joachim. Unsettled Topics Concerning the Impact of Quantum Technologies on Automotive Cybersecurity. SAE International, 2020. http://dx.doi.org/10.4271/epr2020026.

Full text
Abstract:
Quantum computing is considered the “next big thing” when it comes to solving computational problems impossible to tackle using conventional computers. However, a major concern is that quantum computers could be used to crack current cryptographic schemes designed to withstand traditional cyberattacks. This threat also impacts future automated vehicles as they become embedded in a vehicle-to-everything (V2X) ecosystem. In this scenario, encrypted data is transmitted between a complex network of cloud-based data servers, vehicle-based data servers, and vehicle sensors and controllers. While the
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!