Journal articles on the topic 'Cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)." Journal of Physics: Conference Series 2386, no. 1 (December 1, 2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Full textGoldreich, Oded. "Cryptography and cryptographic protocols." Distributed Computing 16, no. 2-3 (September 1, 2003): 177–99. http://dx.doi.org/10.1007/s00446-002-0077-1.
Full textAdeyemi Afolayan Adesola, Awele Mary-rose Ilusanmi, and Peter Chimee. "A review of the cryptographic approaches to data security: The impact of quantum computing, evolving challenges and future solutions." World Journal of Advanced Research and Reviews 25, no. 2 (February 28, 2025): 1916–24. https://doi.org/10.30574/wjarr.2025.25.2.0434.
Full textAnilkumar, Chunduru, Bhavani Gorle, and Kinthali Sowmya. "A Secure Method of Communication in Conventional Cryptography using Quantum Key Distribution." Applied and Computational Engineering 8, no. 1 (August 1, 2023): 68–73. http://dx.doi.org/10.54254/2755-2721/8/20230083.
Full textDonia Fadil Chalob, Rusul Hussein Hasan, and Suaad M. Saber. "A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis." International Journal of Scientific Research in Science, Engineering and Technology 12, no. 1 (February 18, 2025): 275–82. https://doi.org/10.32628/ijsrset25121171.
Full textBhoomika, P. Shetty, S. Darshan, B. R. Drakshayanamma, and Abdulhayan Sayed. "Review on Quantum Key Distribution." Journal of Optical Communication Electronics 5, no. 2 (May 1, 2019): 1–4. https://doi.org/10.5281/zenodo.2656087.
Full textWei, Yuchong. "A Survey of Lattice Cryptography." Applied and Computational Engineering 135, no. 1 (February 27, 2025): 210–16. https://doi.org/10.54254/2755-2721/2025.21190.
Full textPasupuleti, Murali Krishna. "Algebraic Geometry Methods in Cryptographic Protocol Design." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 04 (April 21, 2025): 296–304. https://doi.org/10.62311/nesx/rp2525.
Full textRusetskaya, Irina A. "CRYPTOGRAPHY. FROM THE PAST TO THE FUTURE." RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, no. 4 (2021): 47–57. http://dx.doi.org/10.28995/2686-679x-2021-4-47-57.
Full textGoyal, Rohit. "Quantum Cryptography: Secure Communication Beyond Classical Limits." Journal of Quantum Science and Technology 1, no. 1 (March 31, 2024): 1–5. http://dx.doi.org/10.36676/jqst.v1.i1.01.
Full textVictor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat, and Abdullayeva Shakhzoda. "Cryptography: Advances in Secure Communication and Data Protection." E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.
Full textShuxrat, Toirov Abduganiyevich, Eldor Islomovich Saidakhmedov, and X.U Akbarov. "Enhancing post-quantum security through hybrid cryptographic systems integrating quantum key distribution." Yashil iqtisodiyot va taraqqiyot 3, no. 2 (February 7, 2025): 6–10. https://doi.org/10.5281/zenodo.14868992.
Full textAnilkumar, Chunduru, Swathi Lenka, N. Neelima, and Sathishkumar V E. "A Secure Method of Communication Through BB84 Protocol in Quantum Key Distribution." Scalable Computing: Practice and Experience 25, no. 1 (January 4, 2024): 21–33. http://dx.doi.org/10.12694/scpe.v25i1.2152.
Full textWANG, XINGYUAN, MING LIU, and NINI GU. "TWO NEW CHAOTIC CRYPTOGRAPHIES BASED ON DIFFERENT ATTRACTOR-PARTITION ALGORITHMS." International Journal of Modern Physics B 21, no. 27 (October 30, 2007): 4739–50. http://dx.doi.org/10.1142/s0217979207038071.
Full textShashi Raj K. "The Intersection of Algebra and Cryptography: Enhancing Information Security through Mathematical Foundations." Communications on Applied Nonlinear Analysis 31, no. 4s (July 5, 2024): 466–89. http://dx.doi.org/10.52783/cana.v31.943.
Full textYadav, Sonam. "An Extensive Study on Lattice-Based Cryptography and its Applications for RLWE-Based Problems." Universal Research Reports 10, no. 3 (2023): 104–10. http://dx.doi.org/10.36676/urr.2023-v10i3-014.
Full textOh, Chaerin, Woosang Im, Hyunil Kim, and Changho Seo. "Recent Trends in Cryptanalysis Techniques for White-box Block Ciphers." Korean Institute of Smart Media 12, no. 9 (October 30, 2023): 9–18. http://dx.doi.org/10.30693/smj.2023.12.9.9.
Full textBAFTIU, Naim. "Analysis and use of Cryptography techniques in programming language C#: Coding and Decoding." PRIZREN SOCIAL SCIENCE JOURNAL 4, no. 3 (December 31, 2020): 1–10. http://dx.doi.org/10.32936/pssj.v4i3.165.
Full textJohn, Michael, Ogoegbulem Ozioma, Perpetua Ngozi Obi, Henry Etaroghene Egbogho, and Otobong. G. Udoaka. "Lattices in Quantum-ERA Cryptography." International Journal of Research Publication and Reviews, V 4, no. 11 (November 26, 2023): 2175–79. https://doi.org/10.5281/zenodo.10207210.
Full textVirk, Udayveer Singh, Devansh Verma, Gagandeep Singh, and Prof Sheetal Laroiya Prof. Sheetal Laroiya. "Analyzing Cryptographic Techniques and Machine Learning Algorithms for Crime Prediction." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (October 22, 2024): 1–6. http://dx.doi.org/10.55041/ijsrem38099.
Full textCaleg Sadrak Sinaga, Alwi Findo Gultom, Dewi Ruth Nababan, Ari Rivaldo Simanjuntak, and Edi Ginting. "Cryptography With Mceliece Algorithm (Code Based Cryptography)." Jurnal Teknik Indonesia 3, no. 02 (November 5, 2024): 49–53. https://doi.org/10.58471/ju-ti.v3i02.665.
Full textHammad, Baraa Tareq, Ali Maki Sagheer, Ismail Taha Ahmed, and Norziana Jamil. "A comparative review on symmetric and asymmetric DNA-based cryptography." Bulletin of Electrical Engineering and Informatics 9, no. 6 (December 1, 2020): 2484–91. http://dx.doi.org/10.11591/eei.v9i6.2470.
Full textBaraa, Tareq Hammad, Maki Sagheer Ali, Taha Ahmed Ismail, and Jamil Norziana. "A comparative review on symmetric and asymmetric DNA-based cryptography." Bulletin of Electrical Engineering and Informatics 9, no. 6 (December 1, 2020): 2484–91. https://doi.org/10.11591/eei.v9i6.2470.
Full textKumar,, Varun. "Challenges and Future Trends of Cryptography in Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 10, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30505.
Full textEt. al., Mandru Manisha,. "Colour Visual Cryptography (3,3) Scheme." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 3189–98. http://dx.doi.org/10.17762/turcomat.v12i2.2374.
Full textMd., Aminur Rahman, and Nuruzzaman Laskar AKM. "Quantum Cryptography: Advancements and Implications for Network Security." Journal of Network Security and Data Mining 7, no. 3 (June 5, 2024): 9–19. https://doi.org/10.5281/zenodo.11483650.
Full textTeja, Penumantra Satya Sai, Mounika Lakshmi P, and Vinay Kumar K. "A Secure Communication through Quantum Key Distribution Protocols." International Research Journal of Electronics and Computer Engineering 4, no. 3 (September 30, 2018): 14. http://dx.doi.org/10.24178/irjece.2018.4.3.14.
Full textRedhu, Ritu, and Ekta Narwal. "An exploratory analysis of the evolution and trends of code-based cryptography." Journal of Discrete Mathematical Sciences and Cryptography 28, no. 3 (2025): 959–72. https://doi.org/10.47974/jdmsc-2236.
Full textDabola, Shashank. "Chat Secure-Messaging Application Based on Secure Encryption Algorithm." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (March 31, 2024): 303–5. http://dx.doi.org/10.22214/ijraset.2024.58817.
Full textMs., Kummasani Vinodhini. "Artifical Intelligence in Cryptography: Protection of Cryptographic System under Patents." Annual International Journal on Analysis of Contemporary Legal Affairs (AIJACLA) 5 (May 25, 2025): 95–111. https://doi.org/10.5281/zenodo.15514117.
Full textAnnu. "Algebraic Structures and Their Applications in Modern Cryptography." Innovative Research Thoughts 10, no. 3 (July 25, 2024): 52–59. http://dx.doi.org/10.36676/irt.v10.i3.1433.
Full textMohammed, Anwar. "Quantum-Resistant Cryptography: Developing Encryption Against Quantum Attacks." Quantum-Resistant Cryptography: Developing Encryption Against Quantum Attacks 1, no. 1 (August 16, 2018): 1–11. https://doi.org/10.5281/zenodo.14760501.
Full textSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications." Mathematical Statistician and Engineering Applications 70, no. 1 (January 31, 2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Full textSabani, Maria E., Ilias K. Savvas, and Georgia Garani. "Learning with Errors: A Lattice-Based Keystone of Post-Quantum Cryptography." Signals 5, no. 2 (April 13, 2024): 216–43. http://dx.doi.org/10.3390/signals5020012.
Full textAbiodun, O. Odedoyin, O. Odukoya Helen, and O. Oluwatope Ayodeji. "A Quantum Cryptography Protocol for Access Control in Big Data." International Journal on Cryptography and Information Security (IJCIS) 8, no. 2 (June 30, 2018): 1–12. https://doi.org/10.5281/zenodo.1304106.
Full textKhamalwa, Mulemi Simiyu. "Exploring how Commutative Algebra Underpins Cryptographic Protocols and Encryption Methods Used in Secure Communications and Data Protection." NEWPORT INTERNATIONAL JOURNAL OF SCIENTIFIC AND EXPERIMENTAL SCIENCES 5, no. 3 (June 14, 2024): 58–62. http://dx.doi.org/10.59298/nijses/2024/10.5.586237.
Full textAkram, Zaryab. "Cryptology Based on Laplace Transform of Hyperbolic Function and Matrix Decomposition Method." ECS Meeting Abstracts MA2022-02, no. 64 (October 9, 2022): 2364. http://dx.doi.org/10.1149/ma2022-02642364mtgabs.
Full textChandre, Pankaj R., Bhagyashree D. Shendkar, Sayalee Deshmukh, Sameer Kakade, and Suvarna Potdukhe. "Machine Learning-Enhanced Advancements in Quantum Cryptography: A Comprehensive Review and Future Prospects." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11s (October 10, 2023): 642–55. http://dx.doi.org/10.17762/ijritcc.v11i11s.8300.
Full textDubey, Praveer, and Ompal Yadav. "A Survey on Quantum cryptography versus classical Cryptography." International Journal of Current Engineering and Technology 10, no. 06 (October 31, 2021): 910–13. http://dx.doi.org/10.14741/ijcet/v.10.6.3.
Full textBala, Romi, and Hemant Pandey. "Advances in Discrete Mathematics: From Combinatorics to Cryptography." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, no. 3 (December 13, 2019): 1643–46. http://dx.doi.org/10.61841/turcomat.v10i3.14624.
Full textShah, Aayush, Prabhat Mahato, and Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (August 31, 2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Full textSedat Sonko, Kenneth Ifeanyi Ibekwe, Valentine Ikenna Ilojianya, Emmanuel Augustine Etukudoh, and Adefunke Fabuyide. "QUANTUM CRYPTOGRAPHY AND U.S. DIGITAL SECURITY: A COMPREHENSIVE REVIEW: INVESTIGATING THE POTENTIAL OF QUANTUM TECHNOLOGIES IN CREATING UNBREAKABLE ENCRYPTION AND THEIR FUTURE IN NATIONAL SECURITY." Computer Science & IT Research Journal 5, no. 2 (February 18, 2024): 390–414. http://dx.doi.org/10.51594/csitrj.v5i2.790.
Full textDhakne, Dr Amol, Prasann Shimpi, Sanket Halake, Shivam Dharmshetti, and Shashank Singh. "Neural Network Based Message Concealment Scheme." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 1368–78. http://dx.doi.org/10.22214/ijraset.2022.42522.
Full textTejasweeni Pradhan. "Quantum Cryptography for Secure Autonomous Vehicle Networks." Advances in Nonlinear Variational Inequalities 28, no. 1s (November 1, 2024): 449–59. https://doi.org/10.52783/anvi.v28.2445.
Full textOlajide Soji Osundare, Chidiebere Somadina Ike, Ololade Gilbert Fakeyede, and Adebimpe Bolatito Ige. "Blockchain and quantum cryptography: Future of secure telecommunications in banking." Engineering Science & Technology Journal 3, no. 2 (December 30, 2022): 154–71. http://dx.doi.org/10.51594/estj.v3i2.1523.
Full textPriya, R. Shanmuga, and A. Senthilkumar. "A Study on Visual Cryptography for Colour Images." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (August 1, 2017): 260. http://dx.doi.org/10.23956/ijarcsse/v7i7/0172.
Full textSubhalaxmi Sabitri Das, Subhalaxmi Sabitri Das, Sachin Jena Sachin Jena, and H. Dipali Singh H.Dipali Singh. "The Role of Cryptography in Cyber Security." International Journal of Engineering and Science Invention 14, no. 5 (May 2025): 48–54. https://doi.org/10.35629/6734-14054854.
Full textMathew Sebastian. "Cryptographic milestones: Origins, modern algorithms, and the quantum era." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (May 30, 2025): 387–93. https://doi.org/10.30574/wjaets.2025.15.2.0561.
Full textKaushal, Milind. "Cryptography: A Brief Review." International Journal for Research in Applied Science and Engineering Technology 10, no. 2 (February 28, 2022): 763–67. http://dx.doi.org/10.22214/ijraset.2022.40401.
Full textWang, Xing, Qiang Zhang, and Xiao Peng Wei. "A New Encryption Method Based on Rijndael Algorithm and DNA Computing." Applied Mechanics and Materials 20-23 (January 2010): 1241–46. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1241.
Full text