Academic literature on the topic 'Hybrid Cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hybrid Cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Hybrid Cryptography"
HOOBI, Mays M. "SURVEY: EFFICIENT HYBRID ALGOR ITHMS OF CRYPTOGRAPHY." MINAR International Journal of Applied Sciences and Technology 2, no. 4 (2020): 1–16. http://dx.doi.org/10.47832/2717-8234.4-2.1.
Full textShuxrat, Toirov Abduganiyevich, Eldor Islomovich Saidakhmedov, and X.U Akbarov. "Enhancing post-quantum security through hybrid cryptographic systems integrating quantum key distribution." Yashil iqtisodiyot va taraqqiyot 3, no. 2 (2025): 6–10. https://doi.org/10.5281/zenodo.14868992.
Full textManap, Abusaid, Gulnar Abitova, Gulzhan Uskenbayeva, and Aigul Shaikhanova. "DESIGN OF TECHNOLOGY FOR SECURE FILE STORAGE BASED ON HYBRID CRYPTOGRAPHY METHODS: SHORT OVERVIEW." Вестник КазАТК 129, no. 6 (2023): 205–15. http://dx.doi.org/10.52167/1609-1817-2023-129-6-205-215.
Full textSantoso, Yogi Suryo. "Message Security Using a Combination of Hill Cipher and RSA Algorithms." Jurnal Matematika Dan Ilmu Pengetahuan Alam LLDikti Wilayah 1 (JUMPA) 1, no. 1 (2021): 20–28. http://dx.doi.org/10.54076/jumpa.v1i1.38.
Full textNovianti, Chofifah Alfin, Muhammad Khudzaifah, and Mohammad Nafie Jauhari. "Kriptografi Hibrida Cipher Block Chaining (CBC) dan Merkle-Hellman Knapsack untuk Pengamanan Pesan Teks." Jurnal Riset Mahasiswa Matematika 3, no. 1 (2023): 10–25. http://dx.doi.org/10.18860/jrmm.v3i1.22292.
Full textNana, Nana, and Puguh Wahyu Prasetyo. "An implementation of Hill cipher and 3x3x3 rubik's cube to enhance communication security." Bulletin of Applied Mathematics and Mathematics Education 1, no. 2 (2021): 75–92. http://dx.doi.org/10.12928/bamme.v1i2.4252.
Full textBhawane, Manas. "Secured Data Storage on the Cloud Using Hybrid Cryptography." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 2516–18. https://doi.org/10.22214/ijraset.2024.65674.
Full textJohn, Anita, and Jimmy Jose. "Hash Function Design Based on Hybrid Five-Neighborhood Cellular Automata and Sponge Functions." Complex Systems 32, no. 2 (2023): 171–88. http://dx.doi.org/10.25088/complexsystems.32.2.171.
Full textYang, Huiwei. "Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card." Security and Communication Networks 2022 (May 30, 2022): 1–11. http://dx.doi.org/10.1155/2022/7794209.
Full textManap, A. T., and G. A. Abitova. "Development of information technology for secure file storage based on hybrid cryptography methods." Bulletin of Shakarim University. Technical Sciences 1, no. 4(12) (2023): 39–46. http://dx.doi.org/10.53360/2788-7995-2023-4(12)-6.
Full textDissertations / Theses on the topic "Hybrid Cryptography"
Mazzoncini, Francesco. "Multimode Quantum Communications and Hybrid Cryptography." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAT018.
Full textVyas, Nilesh. "Quantum cryptography in a hybrid security model." Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAT049.
Full textMéaux, Pierrick. "Hybrid fully homomorphic framework." Thesis, Paris Sciences et Lettres (ComUE), 2017. http://www.theses.fr/2017PSLEE066/document.
Full textGłuszek, Gregory A. "Optimizing scalar multiplication for Koblitz curves using hybrid FPGAs /." Online version of thesis, 2009. http://hdl.handle.net/1850/10761.
Full textKhomlyak, Olha. "An investigation of lightweight cryptography and using the key derivation function for a hybrid scheme for security in IoT." Thesis, Blekinge Tekniska Högskola, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14982.
Full textRamsey, Glenn. "Hardware/software optimizations for elliptic curve scalar multiplication on hybrid FPGAs /." Online version of thesis, 2008. http://hdl.handle.net/1850/7765.
Full textWunderer, Thomas [Verfasser], Johannes [Akademischer Betreuer] Buchmann, and Martin [Akademischer Betreuer] Albrecht. "On the Security of Lattice-Based Cryptography Against Lattice Reduction and Hybrid Attacks / Thomas Wunderer ; Johannes Buchmann, Martin Albrecht." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2018. http://d-nb.info/116879868X/34.
Full textVo, Tan Phuoc. "Théorie du contrôle et systèmes hybrides dans un contexte cryptographique." Phd thesis, Institut National Polytechnique de Lorraine - INPL, 2009. http://tel.archives-ouvertes.fr/tel-00452699.
Full textVo, Tan Phuoc. "Théorie du contrôle et systèmes hybrides dans un contexte cryptographique." Electronic Thesis or Diss., Vandoeuvre-les-Nancy, INPL, 2009. http://www.theses.fr/2009INPL079N.
Full textBansal, Tarun Kumar. "Designing generic asymmetric key cryptosystem with message paddings." Thesis, Queensland University of Technology, 2018. https://eprints.qut.edu.au/117071/1/Tarun%20Kumar_Bansal_Thesis.pdf.
Full textBooks on the topic "Hybrid Cryptography"
Energy Systems for Electric and Hybrid Vehicles. Institution of Engineering & Technology, 2016.
Find full textMartin, Keith M. Public-Key Encryption. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0005.
Full textBook chapters on the topic "Hybrid Cryptography"
Pattanayak, Sayantica, and Simone A. Ludwig. "Encryption Based on Neural Cryptography." In Hybrid Intelligent Systems. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-76351-4_33.
Full textShraddha, B. H., Bhagyashree Kinnal, Heera Wali, Nalini C. Iyer, and P. Vishal. "Lightweight Cryptography for Resource Constrained Devices." In Hybrid Intelligent Systems. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96305-7_51.
Full textKurosawa, Kaoru. "Hybrid Encryption." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_321.
Full textKurosawa, Kaoru, and Yvo Desmedt. "Hybrid Encryption." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2024. http://dx.doi.org/10.1007/978-3-642-27739-9_321-2.
Full textKurosawa, Kaoru, and Yvo Desmedt. "Hybrid Encryption." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_321.
Full textNoor-ul-Ain, W., M. Atta-ur-Rahman, Muhammad Nadeem, and Abdul Ghafoor Abbasi. "Quantum Cryptography Trends: A Milestone in Information Security." In Hybrid Intelligent Systems. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27221-4_3.
Full textKatt, Basel, and Stewart Kowalski. "Hybrid Cyber Range." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1583-1.
Full textKatt, Basel, and Stewart Kowalski. "Hybrid Cyber Range." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_1583.
Full textPersichetti, Edoardo. "Secure and Anonymous Hybrid Encryption from Coding Theory." In Post-Quantum Cryptography. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38616-9_12.
Full textRosulek, Mike, and Morgan Shirley. "On the Structure of Unconditional UC Hybrid Protocols." In Theory of Cryptography. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03810-6_4.
Full textConference papers on the topic "Hybrid Cryptography"
Sengupta, Disha, Subhash A. Nalawade, Lakshmi Sharma, Mrunal Sanjay Jagtap Kakade, Vishal Kisan Borate, and Yogesh Kisan Mali. "Enhancing File Security Using Hybrid Cryptography." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724120.
Full textRathod, Jayanthkumar A., Chandana PT, Keerthana G, Shwetha R. Sharma, and Swetha S. "Efficient Message Transmission Using Hybrid Cryptography." In 2024 Second International Conference on Advances in Information Technology (ICAIT). IEEE, 2024. http://dx.doi.org/10.1109/icait61638.2024.10690379.
Full textTiwari, Asheesh, Anmol Kumar Pandey, Lavlesh Singh, Gagan Kumar Tiwari, and Aagat Singh. "Hybrid Cryptography Algorithms for Cloud Data Security." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725233.
Full textJ, Joshwa, and Angeline Benitta D. "Extended Cloud Storage Security Using Hybrid Cryptography." In 2025 8th International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, 2025. https://doi.org/10.1109/icoei65986.2025.11013647.
Full textBadhan, Akash, and Simarjit Singh Malhi. "A Review on Hybrid Cryptography approach with Steganography." In 2024 12th International Conference on Internet of Everything, Microwave, Embedded, Communication and Networks (IEMECON). IEEE, 2024. https://doi.org/10.1109/iemecon62401.2024.10846056.
Full textRani, Shreenagamanjula, Santhosh Krishna B V, Tejaswini S, Uma Maheshwari A, and Triveni A. "Securing Information Transfer with Hybrid Cryptography via Cloud." In 2024 Second International Conference on Inventive Computing and Informatics (ICICI). IEEE, 2024. http://dx.doi.org/10.1109/icici62254.2024.00121.
Full textBadhan, Akash, and Simarjit Singh Malhi. "Enhancing Data Security with Hybrid Cryptography and Steganography." In 2024 2nd International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT). IEEE, 2024. https://doi.org/10.1109/icaiccit64383.2024.10912267.
Full textOpoku, Stephanie, Habib Louafi, and Malek Mouhoub. "A Hybrid-Based Transfer Learning Approach for IoT Device Identification." In 22nd International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013449000003979.
Full textDighriri, Osama, Priyadarsi Nanda, Manoranjan Mohanty, and Ibrahim Haddadi. "Secure and Hybrid Clustering for IoT Networks: An Adaptive Dynamic Reconfigurability Approach." In 22nd International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013525600003979.
Full textKaushik, Harshita, Himanshu Arora, Ravi Joshi, Khushboo Sharma, Monika Mehra, and Pushpendra Kumar Sharma. "Digital Image Security using Hybrid Model of Steganography and Cryptography." In 2025 International Conference on Electronics and Renewable Systems (ICEARS). IEEE, 2025. https://doi.org/10.1109/icears64219.2025.10941043.
Full textReports on the topic "Hybrid Cryptography"
Draelos, Timothy John, Mark Dolan Torgerson, William Douglas Neumann, Donald R. Gallup, Michael Joseph Collins, and Cheryl Lynn Beaver. Hybrid cryptography key management. Office of Scientific and Technical Information (OSTI), 2003. http://dx.doi.org/10.2172/918318.
Full textPasupuleti, Murali Krishna. Scalable Quantum Networks: Entanglement-Driven Secure Communication. National Education Services, 2025. https://doi.org/10.62311/nesx/rrvi525.
Full textPasupuleti, Murali Krishna. Quantum Semiconductors for Scalable and Fault-Tolerant Computing. National Education Services, 2025. https://doi.org/10.62311/nesx/rr825.
Full text