Academic literature on the topic 'Cryptosystem'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cryptosystem.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cryptosystem"
WANG, XING-YUAN, and YISONG TAN. "A MULTIPLE-PLAINTEXTS-ORIENTED CHAOTIC CRYPTOSYSTEM." International Journal of Modern Physics B 27, no. 32 (December 2013): 1350202. http://dx.doi.org/10.1142/s0217979213502020.
Full textAlekseychuk, Anton, and Olha Shevchuk. "A necessary condition for CPA-security of randomized symmetric code cryptosystems." Physico-mathematical modelling and informational technologies, no. 33 (September 3, 2021): 78–82. http://dx.doi.org/10.15407/fmmit2021.33.078.
Full textMaxrizal, Maxrizal, and Baiq Desy Aniska Prayanti. "Public Key Cryptosystem Based on Polynomial Composition." Indonesian Journal of Mathematics Education 2, no. 2 (October 30, 2019): 69. http://dx.doi.org/10.31002/ijome.v2i2.1813.
Full textFujita, Hachiro. "Quantum McEliece public-key cryptosystem." Quantum Information and Computation 12, no. 3&4 (March 2012): 181–203. http://dx.doi.org/10.26421/qic12.3-4-1.
Full textMaxrizal, Maxrizal. "Public Key Cryptosystem Based on Singular Matrix." Trends in Sciences 19, no. 3 (January 20, 2022): 2147. http://dx.doi.org/10.48048/tis.2022.2147.
Full textUkwuoma, Henry Chima, Gabriel Arome, Aderonke Thompson, and Boniface Kayode Alese. "Post-quantum cryptography-driven security framework for cloud computing." Open Computer Science 12, no. 1 (January 1, 2022): 142–53. http://dx.doi.org/10.1515/comp-2022-0235.
Full textHuang, Huawei, Chunhua Li, and Lunzhi Deng. "Public-Key Cryptography Based on Tropical Circular Matrices." Applied Sciences 12, no. 15 (July 23, 2022): 7401. http://dx.doi.org/10.3390/app12157401.
Full textWANG, XINGYUAN, JIANFENG ZHAO, and ZHENFENG ZHANG. "A CHAOTIC CRYPTOSYSTEM BASED ON MULTI-ONE-DIMENSIONAL MAPS." Modern Physics Letters B 23, no. 02 (January 20, 2009): 183–89. http://dx.doi.org/10.1142/s0217984909017947.
Full textZhou, Xuan Wu, and Yan Fu. "Blind Signature Based on Discrete Logarithm Type Cryptosystem." Advanced Materials Research 204-210 (February 2011): 1318–21. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.1318.
Full textHryshchuk, Ruslan, and Olga Hryshchuk. "A GENERALIZED MODEL OF FREDHOLM'S CRYPTOSYSTEM." Cybersecurity: Education Science Technique, no. 4 (2019): 14–23. http://dx.doi.org/10.28925/2663-4023.2019.4.1423.
Full textDissertations / Theses on the topic "Cryptosystem"
Huynh, Evan. "Rabin's Cryptosystem." Thesis, Linnéuniversitetet, Institutionen för matematik (MA), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-105964.
Full textMersin, Ali Koltuksuz Ahmet. "The Comparative Performance Analysis of Lattice Based Ntru Cryptosystem With Other Asymmetrical Cryptosystems/." [s.l.]: [s.n.], 2007. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000609.pdf.
Full textHettinger, Christopher James. "A New Public-Key Cryptosystem." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/5492.
Full textCimen, Canan. "On The Ntru Public Key Cryptosystem." Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/3/12609848/index.pdf.
Full textІлясова, О. Є. "Аналіз алгоритмів побудови параметрів для криптосистем на еліптичних кривих." Thesis, Видавництво СумДУ, 2006. http://essuir.sumdu.edu.ua/handle/123456789/22416.
Full textWilliams, Deidre D. "Key management for McEliece public-key cryptosystem." Diss., Georgia Institute of Technology, 1994. http://hdl.handle.net/1853/14864.
Full textChoi, Su-Jeong. "Cryptanalysis of a homomorphic public-key cryptosystem." Thesis, Royal Holloway, University of London, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.434343.
Full textTu, Zhiqi. "Enhancements of the Non-linear Knapsack Cryptosystem." Thesis, University of Canterbury. Computer Science and Software Engineering, 2006. http://hdl.handle.net/10092/1080.
Full textClevenger, Mark Allen. "Data encryption using RSA public-key cryptosystem." Virtual Press, 1996. http://liblink.bsu.edu/uhtbin/catkey/1014844.
Full textDepartment of Computer Science
Aysu, Aydin. "Resource-constrained and Resource-efficient Modern Cryptosystem Design." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/78469.
Full textPh. D.
Books on the topic "Cryptosystem"
K, Kokula Krishna Hari, ed. MIMO Wireless based Cryptosystem using Electronic Key Generation Unit. Chennai, India: Association of Scientists, Developers and Faculties, 2016.
Find full textZhang, Jiang, and Zhenfeng Zhang. Lattice-Based Cryptosystems. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8427-5.
Full textDing, Jintai, Albrecht Petzoldt, and Dieter S. Schmidt. Multivariate Public Key Cryptosystems. New York, NY: Springer US, 2020. http://dx.doi.org/10.1007/978-1-0716-0987-3.
Full textMenezes, A. J. Elliptic curve public key cryptosystems. Boston: Kluwer Academic Publishers, 1993.
Find full textMenezes, Alfred. Elliptic Curve Public Key Cryptosystems. Boston, MA: Springer US, 1993. http://dx.doi.org/10.1007/978-1-4615-3198-2.
Full textMenezes, Alfred. Elliptic Curve Public Key Cryptosystems. Boston, MA: Springer US, 1993.
Find full textYan, Song Y. Quantum Attacks on Public-Key Cryptosystems. Boston, MA: Springer US, 2013.
Find full textYan, Song Y. Quantum Attacks on Public-Key Cryptosystems. Boston, MA: Springer US, 2013. http://dx.doi.org/10.1007/978-1-4419-7722-9.
Full text1967-, Naccache David, and Paillier Pascal, eds. Public key cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 : proceedings. Berlin: Springer, 2002.
Find full text1943-, Imai Hideki, and Zheng Yuliang 1962-, eds. Public key cryptography: Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000 : proceedings. Berlin: Springer, 2000.
Find full textBook chapters on the topic "Cryptosystem"
Bauer, Friedrich L. "Cryptosystem." In Encyclopedia of Cryptography and Security, 284–85. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_167.
Full textKhattab, Ahmed, Zahra Jeddi, Esmaeil Amini, and Magdy Bayoumi. "RBS Cryptosystem." In Analog Circuits and Signal Processing, 75–100. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47545-5_4.
Full textPointcheval, David. "Rabin Cryptosystem." In Encyclopedia of Cryptography and Security, 1013–14. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_151.
Full textKaliski, Burt. "Asymmetric Cryptosystem." In Encyclopedia of Cryptography and Security, 49–50. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_394.
Full textKaliski, Burt. "Symmetric Cryptosystem." In Encyclopedia of Cryptography and Security, 1271. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_438.
Full textWeik, Martin H. "literal cryptosystem." In Computer Science and Communications Dictionary, 910. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_10411.
Full textNakamura, Daisuke, and Kunikatsu Kobayashi. "Modified ElGamal cryptosystem." In Lecture Notes in Computer Science, 96–108. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0030412.
Full textStillwell, John. "The RSA cryptosystem." In Undergraduate Texts in Mathematics, 66–75. New York, NY: Springer New York, 2003. http://dx.doi.org/10.1007/978-0-387-21735-2_4.
Full textWeik, Martin H. "high-grade cryptosystem." In Computer Science and Communications Dictionary, 725. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8368.
Full textRubinstein-Salzedo, Simon. "The RSA Cryptosystem." In Springer Undergraduate Mathematics Series, 113–26. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94818-8_12.
Full textConference papers on the topic "Cryptosystem"
David, Bernardo M., Anderson C. A. Nascimento, and Rafael Tonicelli. "Obtaining Efficient Fully Simulatable Oblivious Transfer from General Assumptions." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2011. http://dx.doi.org/10.5753/sbseg.2011.20567.
Full textMurakami, Yasuyuki, and Masao Kasahara. "Hybrid inter-organization cryptosystem using ElGamal cryptosystem." In 2015 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW). IEEE, 2015. http://dx.doi.org/10.1109/icce-tw.2015.7216953.
Full textWong, Tze Jin, Mohd Rushdan Md Said, Mohamed Othman, and Lee Feng Koo. "A Lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem." In INTERNATIONAL CONFERENCE ON QUANTITATIVE SCIENCES AND ITS APPLICATIONS (ICOQSIA 2014): Proceedings of the 3rd International Conference on Quantitative Sciences and Its Applications. AIP Publishing LLC, 2014. http://dx.doi.org/10.1063/1.4903592.
Full textPrakash, A. John, and V. Rhymend Uthariaraj. "Multicast Cryptosystem: A Cryptosystem for Secure Multicast Communication." In 2008 IFIP International Conference on Network and Parallel Computing (NPC). IEEE, 2008. http://dx.doi.org/10.1109/npc.2008.73.
Full textPaixão, Cesar Alison Monteiro, and Décio Luiz Gazzoni Filho. "An efficient variant of the RSA cryptosystem." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2005. http://dx.doi.org/10.5753/sbseg.2005.21521.
Full textHaj Hussein, Sari. "The hush cryptosystem." In the 2nd international conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1626195.1626224.
Full textCatalano, Dario, Rosario Gennaro, Nick Howgrave-Graham, and Phong Q. Nguyen. "Paillier's cryptosystem revisited." In the 8th ACM conference. New York, New York, USA: ACM Press, 2001. http://dx.doi.org/10.1145/501983.502012.
Full textAGRAWAL, ADITYA, BHASKAR BISWAS, K. K. SHUKLA, and VAIBHAV GUPTA. "Quantum Elgamal Cryptosystem." In Sixth International Conference on Advances in Computing, Control and Networking - ACCN 2017. Institute of Research Engineers and Doctors, 2017. http://dx.doi.org/10.15224/978-1-63248-117-7-52.
Full textJing, Wang, and Guo-ping Jiang. "Irrational-Based Cryptosystem." In 2010 International Workshop on Chaos-Fractals Theories and Applications (IWCFTA). IEEE, 2010. http://dx.doi.org/10.1109/iwcfta.2010.30.
Full textMiyamoto, Tatsuki, and Yasuyuki Murakami. "An implementation of inter-organization cryptosystem based on RSA cryptosystem." In 2015 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW). IEEE, 2015. http://dx.doi.org/10.1109/icce-tw.2015.7216954.
Full textReports on the topic "Cryptosystem"
Zhu, L., P. Leach, and K. Jaganathan. Kerberos Cryptosystem Negotiation Extension. RFC Editor, June 2006. http://dx.doi.org/10.17487/rfc4537.
Full textMcNees, R. A., V. Protopopescu, R. T. Santoro, and J. S. Tolliver. Cryptosystems based on chaotic dynamics. Office of Scientific and Technical Information (OSTI), August 1993. http://dx.doi.org/10.2172/10109488.
Full textBerg, James A. Subspace Arrangement Codes and Cryptosystems. Fort Belvoir, VA: Defense Technical Information Center, May 2011. http://dx.doi.org/10.21236/ada554686.
Full textAIR FORCE COMMUNICATIONS AGENCY SCOTT AFB IL. Air Force Instruction 33-216. Communications and Information. Management of Manual Cryptosystems. Fort Belvoir, VA: Defense Technical Information Center, November 1997. http://dx.doi.org/10.21236/ada403752.
Full textBoyen, X., and L. Martin. Identity-Based Cryptography Standard (IBCS) #1: Supersingular Curve Implementations of the BF and BB1 Cryptosystems. RFC Editor, December 2007. http://dx.doi.org/10.17487/rfc5091.
Full text