Journal articles on the topic 'Cryptography – Research'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cryptography – Research.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Irawan, Muhammad Dedi. "IMPLEMENTASI KRIPTOGRAFI VIGENERE CIPHER DENGAN PHP." JURNAL TEKNOLOGI INFORMASI 1, no. 1 (2017): 11. http://dx.doi.org/10.36294/jurti.v1i1.21.
Full textXu, Shu, Xiaoming Chen, and Xinhai Tong. "Advances in superlattice cryptography research." Chinese Science Bulletin 65, no. 2-3 (2020): 108–16. http://dx.doi.org/10.1360/tb-2019-0291.
Full textSaha, Rahul, G. Geetha, Gulshan Kumar, and Hye-Jim Kim. "Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations." International Journal of Grid and Distributed Computing 10, no. 11 (2017): 79–98. http://dx.doi.org/10.14257/ijgdc.2017.10.11.08.
Full textWagh, Sameer, Xi He, Ashwin Machanavajjhala, and Prateek Mittal. "DP-cryptography." Communications of the ACM 64, no. 2 (2021): 84–93. http://dx.doi.org/10.1145/3418290.
Full textZHANG, Fu-Tai, Yin-Xia SUN, Lei ZHANG, Man-Man GENG, and Su-Juan LI. "Research on Certificateless Public Key Cryptography." Journal of Software 22, no. 6 (2011): 1316–32. http://dx.doi.org/10.3724/sp.j.1001.2011.04007.
Full textDumé, Belle, and Matin Durrani. "Quantum-cryptography research scoops Descartes prize." Physics World 18, no. 1 (2005): 5. http://dx.doi.org/10.1088/2058-7058/18/1/5.
Full textHOOBI, Mays M. "SURVEY: EFFICIENT HYBRID ALGOR ITHMS OF CRYPTOGRAPHY." MINAR International Journal of Applied Sciences and Technology 2, no. 4 (2020): 1–16. http://dx.doi.org/10.47832/2717-8234.4-2.1.
Full textKnudsen, Jonathan. "Java Cryptography." EDPACS 27, no. 4 (1999): 16. http://dx.doi.org/10.1201/1079/43250.27.4.19991001/30275.5.
Full textkumar, N. Shantha, and Dr Hareesh K. "A Primitive Proposal of an Algorithm for IP and Mac Based Data Aggregation and message authentication in Wireless Sensor Networks." International Journal of Soft Computing and Engineering 9, no. 4 (2019): 14–17. http://dx.doi.org/10.35940/ijsce.c3322.109119.
Full textHryshchuk, Ruslan, and Olga Hryshchuk. "A GENERALIZED MODEL OF FREDHOLM'S CRYPTOSYSTEM." Cybersecurity: Education Science Technique, no. 4 (2019): 14–23. http://dx.doi.org/10.28925/2663-4023.2019.4.1423.
Full textDayo Alowolodu, Olufunso, Gabriel K Adelaja, Boniface K Alese, and Olufunke Catherine Olayemi. "Medical Image Security Using Quantum Cryptography." Issues in Informing Science and Information Technology 15 (2018): 057–67. http://dx.doi.org/10.28945/4008.
Full textAlemami, Yahia, Mohamad Afendee Mohamed, Saleh Atiewi, and Mustafa Mamat. "Speech encryption by multiple chaotic map with fast fourier transform." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (2020): 5658. http://dx.doi.org/10.11591/ijece.v10i6.pp5658-5664.
Full textSayid, Jacob, Isaac Sayid, and Jayaprakash Kar. "Certificateless Public Key Cryptography: A Research Survey." International Journal of Security and Its Applications 10, no. 7 (2016): 103–18. http://dx.doi.org/10.14257/ijsia.2016.10.7.10.
Full textKhan, Atif. "Cryptography, security and privacy (CrySP) research group." XRDS: Crossroads, The ACM Magazine for Students 20, no. 2 (2013): 62–63. http://dx.doi.org/10.1145/2541668.
Full textMohamad, Mohd Saiful Adli, Roshidi Din, and Jasmin Ilyani Ahmad. "Research trends review on RSA scheme of asymmetric cryptography techniques." Bulletin of Electrical Engineering and Informatics 10, no. 1 (2021): 487–92. http://dx.doi.org/10.11591/eei.v10i1.2493.
Full textTseng, Yuh–Min, Jui-Di Wu, Sen-Shan Huang, and Tung-Tso Tsai. "Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server." Information Technology And Control 49, no. 4 (2020): 464–81. http://dx.doi.org/10.5755/j01.itc.49.4.25927.
Full textEt. al., Rojasree V. "Research Intuitions of Asymmetric Crypto System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (2021): 5024–33. http://dx.doi.org/10.17762/turcomat.v12i3.2016.
Full textAnderson, Ross J. "Whither Cryptography." Information Management & Computer Security 2, no. 5 (1994): 13–20. http://dx.doi.org/10.1108/09685229410792961.
Full textYevseiev, Serhii, Alla Gavrilova, Bogdan Tomashevsky, and Firuz Samadov. "Research of crypto-code designs construction for using in post quantum cryptography." Development Management 16, no. 4 (2019): 26–39. http://dx.doi.org/10.21511/dm.4(4).2018.03.
Full textAryanti, Aryanti, and Ikhthison Mekongga. "Implementation of Rivest Shamir Adleman Algorithm (RSA) and Vigenere Cipher In Web Based Information System." E3S Web of Conferences 31 (2018): 10007. http://dx.doi.org/10.1051/e3sconf/20183110007.
Full textVlachou, C., J. Rodrigues, P. Mateus, N. Paunković, and A. Souto. "Quantum walk public-key cryptographic system." International Journal of Quantum Information 13, no. 07 (2015): 1550050. http://dx.doi.org/10.1142/s0219749915500501.
Full textJanratchakool, Weena, Sirapat Boonkrong, and Sucha Smanchat. "Finding the Optimal Value for Threshold Cryptography on Cloud Computing." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (2016): 2979. http://dx.doi.org/10.11591/ijece.v6i6.11573.
Full textJanratchakool, Weena, Sirapat Boonkrong, and Sucha Smanchat. "Finding the Optimal Value for Threshold Cryptography on Cloud Computing." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (2016): 2979. http://dx.doi.org/10.11591/ijece.v6i6.pp2979-2988.
Full textChoo, Kim-Kwang Raymond, Josep Domingo-Ferrer, and Lei Zhang. "Cloud Cryptography: Theory, Practice and Future Research Directions." Future Generation Computer Systems 62 (September 2016): 51–53. http://dx.doi.org/10.1016/j.future.2016.04.017.
Full textYang, Zhichao, Rongmao Chen, Chao Li, Longjiang Qu, and Guomin Yang. "On the Security of LWE Cryptosystem against Subversion Attacks." Computer Journal 63, no. 4 (2019): 495–507. http://dx.doi.org/10.1093/comjnl/bxz084.
Full textBai, Lan, Jian Zhang, and Li Zhu. "Public Key Cryptosystem Research Based on Discrete Group." Applied Mechanics and Materials 687-691 (November 2014): 2984–88. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2984.
Full textBrooke, Phil, and Richard Paige. "User-visible cryptography in email and web scenarios." Information & Computer Security 23, no. 1 (2015): 58–72. http://dx.doi.org/10.1108/ics-07-2013-0054.
Full textSalguero Dorokhin, Édgar, Walter Fuertes, and Edison Lascano. "On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key." Security and Communication Networks 2019 (March 18, 2019): 1–10. http://dx.doi.org/10.1155/2019/8214681.
Full textJain, Shipra, and Vishal Bhatnagar. "A Novel Ammonic Conversion Algorithm for Securing Data in DNA using Parabolic Encryption." Information Resources Management Journal 28, no. 2 (2015): 20–31. http://dx.doi.org/10.4018/irmj.2015040102.
Full textGuo, Xiao Qiang, Yan Yan, Li Chao Feng, and Shi Qiu Zheng. "Introduction of Quantum Cryptography." Applied Mechanics and Materials 275-277 (January 2013): 2511–14. http://dx.doi.org/10.4028/www.scientific.net/amm.275-277.2511.
Full textMaram, Balajee, Y. Ramesh Kumar, and K. Lakshmana Rao. "NARSKCA: Novel and robust symmetric key cryptography algorithm." International Journal of Scientific World 3, no. 2 (2015): 244. http://dx.doi.org/10.14419/ijsw.v3i2.5111.
Full textAtmaja, Niko Surya. "Kerahasiaan Teks Basis Data MySQL Menggunakan Algoritma Elgamal." Jurnal Sistim Informasi dan Teknologi 1, no. 4 (2019): 65–71. http://dx.doi.org/10.35134/jsisfotek.v1i4.17.
Full textWijayanti, Dian Eka. "BEBERAPA MODIFIKASI PADA ALGORITMA KRIPTOGRAFI AFFINE CIPHER." Journal of Fundamental Mathematics and Applications (JFMA) 1, no. 2 (2018): 64. http://dx.doi.org/10.14710/jfma.v1i2.19.
Full textLiddy, Carrie. "Commercialization of cryptography." Information Management & Computer Security 5, no. 3 (1997): 87–89. http://dx.doi.org/10.1108/09685229710175738.
Full textNirmal, Prachi R. "Research Technique to Authenticate Digital Image Signature Using Cryptography." International Journal for Research in Applied Science and Engineering Technology 6, no. 7 (2018): 276–80. http://dx.doi.org/10.22214/ijraset.2018.7037.
Full textLI, Hao, Hao HU, and Xiao-Feng CHEN. "Research on Compliant Testing Method of Trusted Cryptography Module." Chinese Journal of Computers 32, no. 4 (2009): 654–63. http://dx.doi.org/10.3724/sp.j.1016.2009.00654.
Full textZhu, Xingxiong, and Tao Fan. "Research on Application of Blockchain and Identity-Based Cryptography." IOP Conference Series: Earth and Environmental Science 252 (July 9, 2019): 042095. http://dx.doi.org/10.1088/1755-1315/252/4/042095.
Full textZhai, Sheping, Yuanyuan Yang, Jing Li, Cheng Qiu, and Jiangming Zhao. "Research on the Application of Cryptography on the Blockchain." Journal of Physics: Conference Series 1168 (February 2019): 032077. http://dx.doi.org/10.1088/1742-6596/1168/3/032077.
Full text范, 明钰. "Domain-Specific Language Research in the Field of Cryptography." Computer Science and Application 09, no. 01 (2019): 157–65. http://dx.doi.org/10.12677/csa.2019.91019.
Full textDias, Selena, Tanmay Kumbhar, Tyrel Menezes, Caroline Pinto, and Pratibha Dumane. "Implementation of Sequential Machine for Encryption of Textual Information." International Journal of Engineering & Technology 7, no. 3.3 (2018): 28. http://dx.doi.org/10.14419/ijet.v7i3.3.14477.
Full textDias, Selena, Tanmay Kumbhar, Tyrel Menezes, Caroline Pinto, Pratibha Dumane, and . "Implementation of Sequential Machine for Encryption of Textual Information." International Journal of Engineering & Technology 7, no. 3.3 (2018): 28. http://dx.doi.org/10.14419/ijet.v7i3.3.14479.
Full textDamanik, Hillman Akhyar, Merry Anggraeni, and Tomi Defisa. "ANALYSIS STEGO-IMAGE EXTRACTION USING ROT13 AND LEAST SIGNIFICANT BIT (LSB) ALGORITHM METHOD ON TEXT SECURITY." Jurnal Ilmiah FIFO 9, no. 2 (2017): 147. http://dx.doi.org/10.22441/fifo.2017.v9i2.008.
Full textYesina, M. V., and B. S. Shahov. "Analysis of hardware implementations of electronic signature algorithms qTesla, Crystals-Dilitium and MQDSS at different levels of security." Radiotekhnika, no. 205 (July 2, 2021): 42–52. http://dx.doi.org/10.30837/rt.2021.2.205.04.
Full textBabu, Erukala Suresh, C. Nagaraju, and M. H. M. Krishna Prasad. "IPHDBCM." International Journal of Information Security and Privacy 10, no. 3 (2016): 42–66. http://dx.doi.org/10.4018/ijisp.2016070104.
Full textSun, Yan Jun, Chang Ming Liu, Hai Yu Li, and Zhe Yuan. "One-Way Function Construction Based on the MQ Problem and Logic Function." Applied Mechanics and Materials 220-223 (November 2012): 2360–63. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.2360.
Full textKachko, Olena, and Serhiy Kandiy. "Research of expediency of application of AVX512 for modern digital signature schemes implementations." Physico-mathematical modelling and informational technologies, no. 32 (July 8, 2021): 141–45. http://dx.doi.org/10.15407/fmmit2021.32.141.
Full textLizama Pérez, Luis Adrián, Leonardo Javier Montiel Arrieta, Flor Seleyda Hernández Mendoza, Luis Adrián Lizama Servín, and Eric Simancas Acevedo. "Public hash signature for mobile network devices." Ingeniería Investigación y Tecnología 20, no. 2 (2019): 1–10. http://dx.doi.org/10.22201/fi.25940732e.2019.20n2.018.
Full textShenoy-Hejamadi, Akshata, Anirban Pathak, and Srikanth Radhakrishna. "Quantum Cryptography: Key Distribution and Beyond." Quanta 6, no. 1 (2017): 1. http://dx.doi.org/10.12743/quanta.v6i1.57.
Full textSun, Hua Feng. "Research on Architecture Survivability of Wireless Networks." Advanced Materials Research 834-836 (October 2013): 1081–86. http://dx.doi.org/10.4028/www.scientific.net/amr.834-836.1081.
Full textTiberti, Walter, Federica Caruso, Luigi Pomante, Marco Pugliese, Marco Santic, and Fortunato Santucci. "Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks." International Journal of Distributed Sensor Networks 16, no. 10 (2020): 155014772095167. http://dx.doi.org/10.1177/1550147720951673.
Full text