Academic literature on the topic 'Encryption (Computer science)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Encryption (Computer science).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Encryption (Computer science)"
AlTuhafi, Ammar Waysi. "Adaptation for Vigenère Cipher Method for Auto Binary Files Ciphering." ITM Web of Conferences 42 (2022): 01017. http://dx.doi.org/10.1051/itmconf/20224201017.
Full textBanerjee, Debjeet, Sagnik Dutta, Souvik Bhattacharyya, Sujan Sarkar, Sneha Rakshit, and Raktim Chakraborty. "NUMBER THEORY AND THEIR APPLICATION IN COMPUTER SCIENCE AND CRYPTOGRAPHY." Journal of Mathematical Sciences & Computational Mathematics 2, no. 1 (2020): 84–89. http://dx.doi.org/10.15864/jmscm.2106.
Full textBozduman, Hanife Çağıl, and Erkan Afacan. "Simulation of a Homomorphic Encryption System." Applied Mathematics and Nonlinear Sciences 5, no. 1 (2020): 479–84. http://dx.doi.org/10.2478/amns.2020.1.00046.
Full textSingh, Pankaj, and Sachin Kumar. "Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish." International Journal of Engineering & Technology 7, no. 1.5 (2017): 221. http://dx.doi.org/10.14419/ijet.v7i1.5.9150.
Full textGlen, Jode. "Security Risks in Computer Networks and Application of Data Encryption Techniques." Computer Life 12, no. 1 (2024): 5–7. http://dx.doi.org/10.54097/x4eym481.
Full textYang, Junpu. "Computer Data Encryption System Based on Nonlinear Partial Differential Equations." Mobile Information Systems 2022 (August 19, 2022): 1–9. http://dx.doi.org/10.1155/2022/3395019.
Full textAlsalam Ali, Nashwan, Abdul Monem S. Rahma, and Shaimaa H. Shaker. "Survey on 3D Content Encryption." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 15 (2021): 115. http://dx.doi.org/10.3991/ijim.v15i15.24179.
Full textKumar, B.Ravi, Chandra Sekhar A., and G.Appala Naidu. "An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 03 (2015): 1548–54. https://doi.org/10.5281/zenodo.14770594.
Full textKuo, Tzu-Hsiang, and Ja-Ling Wu. "A High Throughput BFV-Encryption-Based Secure Comparison Protocol." Mathematics 11, no. 5 (2023): 1227. http://dx.doi.org/10.3390/math11051227.
Full textREN, YANLI, DAWU GU, SHUOZHONG WANG, and XINPENGU ZHANG. "HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES." International Journal of Foundations of Computer Science 21, no. 06 (2010): 1049–63. http://dx.doi.org/10.1142/s0129054110007726.
Full textDissertations / Theses on the topic "Encryption (Computer science)"
Norman, Kelly Robert. "Encryption of Computer Peripheral Devices." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1232.pdf.
Full textGriffy, Scott Sherlock. "Crumpled and Abraded Encryption: Implementation and Provably Secure Construction." PDXScholar, 2019. https://pdxscholar.library.pdx.edu/open_access_etds/5067.
Full textAkdag, Sadik Bahaettin. "An Image Encryption Algorithm Robust To Post-encryption Bitrate Conversion." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607710/index.pdf.
Full textCash, Charles David. "On the security and efficiency of encryption." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31733.
Full textKing, Kevin C. "Optimizing fully homomorphic encryption." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/113156.
Full textWadhwani, Sandeep. "Using chaotic encryption schemes in distributed image storage." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=119757.
Full textJones, John W. "Data encryption based on the logarithm problem." Thesis, University of Ottawa (Canada), 1986. http://hdl.handle.net/10393/4825.
Full textFlorence, Trevor Bradshaw. "KiwiVault: Encryption Software for Portable Storage Devices." BYU ScholarsArchive, 2009. https://scholarsarchive.byu.edu/etd/2156.
Full textXia, Andrew. "Thresholdizing lattice based encryption schemes." Thesis, Massachusetts Institute of Technology, 2018. https://hdl.handle.net/1721.1/121688.
Full textYang, Yang M. Eng Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science. "Evaluation of somewhat homomorphic encryption schemes." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/85530.
Full textBooks on the topic "Encryption (Computer science)"
1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Springer Science+Business Media, LLC, 2011.
Find full textInformation Technology Laboratory (National Institute of Standards and Technology). Announcing the Advanced Encryption Standard (AES). Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2001.
Find full textLibrary of Congress. Congressional Research Service., ed. Encryption technology: Congressional issues. Congressional Research Service, Library of Congress, 2000.
Find full textSmith, Marcia S. Encryption technology: Congressional issues. Congressional Research Service, Library of Congress, 1998.
Find full textBiham, Eli. Differential cryptanalysis of the data encryption standard. Springer-Verlag, 1993.
Find full textXu, Zhengquan. Video encryption technology and application. Nova Science Publishers, 2010.
Find full textInternational Business Machines Corporation. International Technical Support Organization, ed. IBM System Storage Data Encryption. IBM, International Technical Support Organization, 2010.
Find full textXu, Zhengquan. Video encryption technology and application. Nova Science Publishers, 2010.
Find full textThomas, Friedlob G., and Institute of Internal Auditors, eds. An auditor's guide to encryption. The Institute of Internal Auditors, 1997.
Find full textBook chapters on the topic "Encryption (Computer science)"
Weik, Martin H. "encryption." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_6164.
Full textWeik, Martin H. "bulk encryption." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_1927.
Full textWeik, Martin H. "link encryption." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_10374.
Full textWeik, Martin H. "irreversible encryption." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_9614.
Full textNagano, Tetsuya, and Hiroaki Anada. "Finsler Encryption." In Lecture Notes in Computer Science. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-1238-0_11.
Full textWeik, Martin H. "data encryption." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4264.
Full textWeik, Martin H. "encryption algorithm." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_6165.
Full textWeik, Martin H. "encryption device." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_6166.
Full textWeik, Martin H. "encryption key." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_6167.
Full textWeik, Martin H. "encryption standard." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_6168.
Full textConference papers on the topic "Encryption (Computer science)"
Giurgea, Elisa. "Transforming Attribute-Based Encryption schemes into Asymmetric Searchable Encryption schemes." In 19th Conference on Computer Science and Intelligence Systems. PTI, 2024. http://dx.doi.org/10.15439/2024f3018.
Full textBulbul, Busranur, Serif Bahtiyar, and Deniz Turgay Altilar. "Homomorphic Encryption versus Searchable Encryption for Data Retrieval on Cloud." In 2020 5th International Conference on Computer Science and Engineering (UBMK). IEEE, 2020. http://dx.doi.org/10.1109/ubmk50275.2020.9219533.
Full textDelei, Jiang, Bai Sen, and Dong Wenming. "An Image Encryption Algorithm Based on Knight's Tour and Slip Encryption-Filter." In 2008 International Conference on Computer Science and Software Engineering. IEEE, 2008. http://dx.doi.org/10.1109/csse.2008.1142.
Full textXiaoyuan Yang and Xu an Wang. "Proxy re-encryption scheme based on BB2 identity based encryption." In 2009 2nd IEEE International Conference on Computer Science and Information Technology. IEEE, 2009. http://dx.doi.org/10.1109/iccsit.2009.5234980.
Full textAl Mahri, Hassan Qahur, Leonie Simpson, Harry Bartlett, Ed Dawson, and Kenneth Koon-Ho Wong. "Forgery attacks on ++AE authenticated encryption mode." In ACSW '16: Australasian Computer Science Week. ACM, 2016. http://dx.doi.org/10.1145/2843043.2843355.
Full textLee, Eun-Kyu, and Ki Young Lee. "Selective Data Dissemination using Attribute Based Encryption." In Information Technology and Computer Science 2015. Science & Engineering Research Support soCiety, 2015. http://dx.doi.org/10.14257/astl.2015.99.07.
Full textAbbas Fadhil Al-Husainy, Mohammed. "Securing Privacy with Matrices: A New Approach to Image Data Protection." In 5TH INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND COMPUTER SCIENCE (CIC-COCOS'24). Cihan University-Erbil, 2024. http://dx.doi.org/10.24086/cocos2024/paper.1509.
Full textMyers, Steven, and Abhi Shelat. "Bit Encryption Is Complete." In 2009 IEEE 50th Annual Symposium on Foundations of Computer Science (FOCS). IEEE, 2009. http://dx.doi.org/10.1109/focs.2009.65.
Full textBrakerski, Zvika, Craig Gentry, and Vinod Vaikuntanathan. "(Leveled) fully homomorphic encryption without bootstrapping." In the 3rd Innovations in Theoretical Computer Science Conference. ACM Press, 2012. http://dx.doi.org/10.1145/2090236.2090262.
Full textAbrahamyan, Sergey. "Realization of ZKRP Algorithm via Homomorphic Encryption Methods." In Computer Science and Information Technologies 2023. Institute for Informatics and Automation Problems, 2023. http://dx.doi.org/10.51408/csit2023_15.
Full text