Academic literature on the topic 'Cryptography – Research'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cryptography – Research.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cryptography – Research"
Irawan, Muhammad Dedi. "IMPLEMENTASI KRIPTOGRAFI VIGENERE CIPHER DENGAN PHP." JURNAL TEKNOLOGI INFORMASI 1, no. 1 (2017): 11. http://dx.doi.org/10.36294/jurti.v1i1.21.
Full textXu, Shu, Xiaoming Chen, and Xinhai Tong. "Advances in superlattice cryptography research." Chinese Science Bulletin 65, no. 2-3 (2020): 108–16. http://dx.doi.org/10.1360/tb-2019-0291.
Full textSaha, Rahul, G. Geetha, Gulshan Kumar, and Hye-Jim Kim. "Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations." International Journal of Grid and Distributed Computing 10, no. 11 (2017): 79–98. http://dx.doi.org/10.14257/ijgdc.2017.10.11.08.
Full textWagh, Sameer, Xi He, Ashwin Machanavajjhala, and Prateek Mittal. "DP-cryptography." Communications of the ACM 64, no. 2 (2021): 84–93. http://dx.doi.org/10.1145/3418290.
Full textZHANG, Fu-Tai, Yin-Xia SUN, Lei ZHANG, Man-Man GENG, and Su-Juan LI. "Research on Certificateless Public Key Cryptography." Journal of Software 22, no. 6 (2011): 1316–32. http://dx.doi.org/10.3724/sp.j.1001.2011.04007.
Full textDumé, Belle, and Matin Durrani. "Quantum-cryptography research scoops Descartes prize." Physics World 18, no. 1 (2005): 5. http://dx.doi.org/10.1088/2058-7058/18/1/5.
Full textHOOBI, Mays M. "SURVEY: EFFICIENT HYBRID ALGOR ITHMS OF CRYPTOGRAPHY." MINAR International Journal of Applied Sciences and Technology 2, no. 4 (2020): 1–16. http://dx.doi.org/10.47832/2717-8234.4-2.1.
Full textKnudsen, Jonathan. "Java Cryptography." EDPACS 27, no. 4 (1999): 16. http://dx.doi.org/10.1201/1079/43250.27.4.19991001/30275.5.
Full textkumar, N. Shantha, and Dr Hareesh K. "A Primitive Proposal of an Algorithm for IP and Mac Based Data Aggregation and message authentication in Wireless Sensor Networks." International Journal of Soft Computing and Engineering 9, no. 4 (2019): 14–17. http://dx.doi.org/10.35940/ijsce.c3322.109119.
Full textHryshchuk, Ruslan, and Olga Hryshchuk. "A GENERALIZED MODEL OF FREDHOLM'S CRYPTOSYSTEM." Cybersecurity: Education Science Technique, no. 4 (2019): 14–23. http://dx.doi.org/10.28925/2663-4023.2019.4.1423.
Full textDissertations / Theses on the topic "Cryptography – Research"
Mefford, Greg. "Side Channel Analysis Research Framework (SCARF)." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1342463791.
Full textMeihong, Li, Zhang Qishan, and Wang Jun. "RESEARCH AND IMPLEMENTATION OF MOBILE BANK BASED ON SSL." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/605837.
Full textDeligne, Eddy. "Hyperviseur de protection d'exécutables - Etude, développement et discussion." Phd thesis, Ecole Polytechnique X, 2014. http://pastel.archives-ouvertes.fr/pastel-00976713.
Full textMoulianitakis, Feidias, and Konstantinos Asimakopoulos. "Benchmarking Framework for Transparent Data Encryption Systems." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75814.
Full textGutmann, Peter. "The Design and Verification of a Cryptographic Security Architecture." Thesis, University of Auckland, 2000. http://hdl.handle.net/2292/2310.
Full textPfennig, Stefan, and Elke Franz. "Comparison of Different Secure Network Coding Paradigms Concerning Transmission Efficiency." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-145096.
Full textPfennig, Stefan, and Elke Franz. "Comparison of Different Secure Network Coding Paradigms Concerning Transmission Efficiency." Technische Universität Dresden, 2013. https://tud.qucosa.de/id/qucosa%3A28134.
Full textDyer, Kevin Patrick. "Novel Cryptographic Primitives and Protocols for Censorship Resistance." PDXScholar, 2015. https://pdxscholar.library.pdx.edu/open_access_etds/2489.
Full textChaffe, Tomas. "The Secret Writer." Thesis, Konstfack, Institutionen för Konst (K), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:konstfack:diva-3980.
Full textFujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.
Full textBooks on the topic "Cryptography – Research"
Symposium on State and Progress of Research in Cryptography (3rd 1993 Rome, Italy). Proceedings of the 3rd Symposium on State and Progress of Research in Cryptography: Rome, Italy, February 15-16, 1993 : SPRC '93. Fondazione Ugo Bordoni, 1993.
Find full textBoolean functions in coding theory and cryptography. American Mathematical Society, 2012.
Find full textDam, Kenneth W. The role of private groups in public policy: Cryptography and the National Research Council. Law School, the University of Chicago, 1996.
Find full textWestern, European Workshop on Research in Cryptology (2007 :. Bochum Germany). Research in cryptology: Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, revised selected papers. Springer, 2008.
Find full textStefan, Lucks, Sadeghi Ahmad-Reza, and Wolf Christopher, eds. Research in cryptology: Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, revised selected papers. Springer, 2008.
Find full textWestern European Workshop on Research in Cryptology (2007 : Bochum, Germany). Research in cryptology: Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, revised selected papers. Springer, 2008.
Find full textSexton, Donal J. Signals intelligence in World War II: A research guide. Greenwood Press, 1996.
Find full textLinear A and Cypro-Minoan in the light of heuristics and cryptology: A research report. B.Z. Szałek, 2005.
Find full textForschung, Rüstung und Krieg: Formen, Ausmass und Grenzen des Wissenschaftlereinsatzes für den Zweiten Weltkrieg im Deutschen Reich. Books on Demand, 2005.
Find full text1951-, Chadwick David, Zhao Gansen, and LINK (Online service), eds. Public key infrastructure: Second European PKI Workshop : Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005 : proceedings. Springer, 2005.
Find full textBook chapters on the topic "Cryptography – Research"
Aycock, John, and John Sullins. "Ethical Proactive Threat Research." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14992-4_21.
Full textCairns, Kelsey, Harry Halpin, and Graham Steel. "Security Analysis of the W3C Web Cryptography API." In Security Standardisation Research. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49100-4_5.
Full textMoore, Tyler, and Richard Clayton. "Ethical Dilemmas in Take-Down Research." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29889-9_14.
Full textDesmedt, Yvo. "Some recent research aspects of threshold cryptography." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0030418.
Full textShou, Darren. "Ethical Considerations of Sharing Data for Cybersecurity Research." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29889-9_15.
Full textKalra, Sheetal, and Sandeep K. Sood. "Elliptic Curve Cryptography: Current Status and Research Challenges." In High Performance Architecture and Grid Computing. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22577-2_62.
Full textWest, Andrew G., Pedram Hayati, Vidyasagar Potdar, and Insup Lee. "Spamming for Science: Active Measurement in Web 2.0 Abuse Research." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34638-5_9.
Full textCalmels, Benoît, Sébastien Canard, Marc Girault, and Hervé Sibert. "Low-Cost Cryptography for Privacy in RFID Systems." In Smart Card Research and Advanced Applications. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11733447_17.
Full textWenger, Erich, and Mario Werner. "Evaluating 16-Bit Processors for Elliptic Curve Cryptography." In Smart Card Research and Advanced Applications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-27257-8_11.
Full textWoodbury, Adam D., Daniel V. Bailey, and Christof Paar. "Elliptic Curve Cryptography on Smart Cards without Coprocessors." In Smart Card Research and Advanced Applications. Springer US, 2000. http://dx.doi.org/10.1007/978-0-387-35528-3_5.
Full textConference papers on the topic "Cryptography – Research"
Tsoupikova, Daria, Rong Zeng, Vera Pless, and Janet Beissinger. "Cryptography and mathematics." In ACM SIGGRAPH 2006 Research posters. ACM Press, 2006. http://dx.doi.org/10.1145/1179622.1179668.
Full textVlahek, Dino. "The problem of quantum computers in cryptography and post-quantum cryptography." In StuCoSReC. 5th Student Computer Science Research Conference. University of Primorska Press, 2010. http://dx.doi.org/10.26493/978-961-7055-26-9.61-64.
Full textShanmugasundari, T., Ravi Subban, Saraswathi Shanmugamoorthy, and S. Manogari. "Research on Visual Cryptography Methods." In 2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). IEEE, 2017. http://dx.doi.org/10.1109/iccic.2017.8524449.
Full textGoel, Rajni, Moses Garuba, and Anteneh Girma. "Research Directions in Quantum Cryptography." In Fourth International Conference on Information Technology (ITNG'07). IEEE, 2007. http://dx.doi.org/10.1109/itng.2007.166.
Full textFu, Zhengxin, and Bin Yu. "Research on Rotation Visual Cryptography Scheme." In 2009 International Symposium on Information Engineering and Electronic Commerce. IEEE, 2009. http://dx.doi.org/10.1109/ieec.2009.118.
Full textDiez Jimenez, Efren, and Miriam Martínez-Muñoz. "MATH LEARNING THROUGH CLASSIC CRYPTOGRAPHY." In 11th annual International Conference of Education, Research and Innovation. IATED, 2018. http://dx.doi.org/10.21125/iceri.2018.2359.
Full textHarkanson, R., and Y. Kim. "Applications of elliptic curve cryptography." In CISRC'17: Twelfth Annual Cyber and Information Security Research Conference. ACM, 2017. http://dx.doi.org/10.1145/3064814.3064818.
Full textLei, Sun, Wang Zewu, Zhao Kun, Sun Ruichen, and Li Shuai. "Research and design of cryptography cloud framework." In 2018 IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA). IEEE, 2018. http://dx.doi.org/10.1109/icccbda.2018.8386503.
Full textHu, Dong, and YuYan Wang. "Security Research on WiMAX with Neural Cryptography." In 2008 International Conference on Information Security and Assurance ISA. IEEE, 2008. http://dx.doi.org/10.1109/isa.2008.17.
Full textQu, Yingjie, and Zhengming Hu. "Research and design of elliptic curve cryptography." In 2010 2nd International Conference on Future Computer and Communication. IEEE, 2010. http://dx.doi.org/10.1109/icfcc.2010.5497370.
Full textReports on the topic "Cryptography – Research"
Mizuochi, Norikazu. Research on Electrically Driven Single Photon Emitter by Diamond for Quantum Cryptography. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ada626179.
Full textTaiber, Joachim. Unsettled Topics Concerning the Impact of Quantum Technologies on Automotive Cybersecurity. SAE International, 2020. http://dx.doi.org/10.4271/epr2020026.
Full text