Academic literature on the topic 'Mathematics – Cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mathematics – Cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Mathematics – Cryptography"
Et. al., Mandru Manisha,. "Colour Visual Cryptography (3,3) Scheme." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 3189–98. http://dx.doi.org/10.17762/turcomat.v12i2.2374.
Full textHall, Matthew. "Sharing Teaching Ideas: Calculator Cryptography." Mathematics Teacher 96, no. 3 (March 2003): 210–12. http://dx.doi.org/10.5951/mt.96.3.0210.
Full textGoldreich, Oded. "Cryptography and cryptographic protocols." Distributed Computing 16, no. 2-3 (September 1, 2003): 177–99. http://dx.doi.org/10.1007/s00446-002-0077-1.
Full textBÁRTEK, Květoslav, and Tomáš ZDRÁHAL. "THE MATHEMATICS OF ASYMMETRIC CRYPTOGRAPHY." Trends in Education 12, no. 1 (December 27, 2019): 5–11. http://dx.doi.org/10.5507/tvv.2019.003.
Full textZHANG, YU. "The computational SLR: a logic for reasoning about computational indistinguishability." Mathematical Structures in Computer Science 20, no. 5 (October 2010): 951–75. http://dx.doi.org/10.1017/s0960129510000265.
Full textEt. al., Suneetha Bulla,. "A Comprehensive Survey on Cryptography Evaluation in Mobile (MANETs)." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 3406–16. http://dx.doi.org/10.17762/turcomat.v12i2.2402.
Full textRocca, Charles F. "Mathematics in the History of Cryptography." Cryptologia 38, no. 3 (June 13, 2014): 232–43. http://dx.doi.org/10.1080/01611194.2014.915254.
Full textAgrawal, Shashank, and Billy Rathje. "Kristin Lauter on Cryptography and Mathematics." XRDS: Crossroads, The ACM Magazine for Students 21, no. 3 (March 27, 2015): 20–22. http://dx.doi.org/10.1145/2730916.
Full textDolev, Danny, Cynthia Dwork, and Moni Naor. "Nonmalleable Cryptography." SIAM Review 45, no. 4 (January 2003): 727–84. http://dx.doi.org/10.1137/s0036144503429856.
Full textDamaševičius, Robertas, Rytis Maskeliūnas, Egidijus Kazanavičius, and Marcin Woźniak. "Combining Cryptography with EEG Biometrics." Computational Intelligence and Neuroscience 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/1867548.
Full textDissertations / Theses on the topic "Mathematics – Cryptography"
Kosek, Amy. "An Exploration of Mathematical Applications in Cryptography." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1428944810.
Full textDéchène, Isabelle. "Generalized Jacobians in cryptography." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=100347.
Full textKlembalski, Katharina. "Cryptography and number theory in the classroom -- Contribution of cryptography to mathematics teaching." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-80390.
Full textHutchinson, Aaron. "Algorithms in Elliptic Curve Cryptography." Thesis, Florida Atlantic University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=10980188.
Full textElliptic curves have played a large role in modern cryptography. Most notably, the Elliptic Curve Digital Signature Algorithm (ECDSA) and the Elliptic Curve Diffie-Hellman (ECDH) key exchange algorithm are widely used in practice today for their efficiency and small key sizes. More recently, the Supersingular Isogeny-based Diffie-Hellman (SIDH) algorithm provides a method of exchanging keys which is conjectured to be secure in the post-quantum setting. For ECDSA and ECDH, efficient and secure algorithms for scalar multiplication of points are necessary for modern use of these protocols. Likewise, in SIDH it is necessary to be able to compute an isogeny from a given finite subgroup of an elliptic curve in a fast and secure fashion.
We therefore find strong motivation to study and improve the algorithms used in elliptic curve cryptography, and to develop new algorithms to be deployed within these protocols. In this thesis we design and develop d-MUL, a multidimensional scalar multiplication algorithm which is uniform in its operations and generalizes the well known 1-dimensional Montgomery ladder addition chain and the 2-dimensional addition chain due to Dan J. Bernstein. We analyze the construction and derive many optimizations, implement the algorithm in software, and prove many theoretical and practical results. In the final chapter of the thesis we analyze the operations carried out in the construction of an isogeny from a given subgroup, as performed in SIDH. We detail how to efficiently make use of parallel processing when constructing this isogeny.
Goldenberg, David. "Adaptive learning and cryptography." W&M ScholarWorks, 2010. https://scholarworks.wm.edu/etd/1539623564.
Full textEnos, Graham. "Binary Edwards curves in elliptic curve cryptography." Thesis, The University of North Carolina at Charlotte, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3563153.
Full textEdwards curves are a new normal form for elliptic curves that exhibit some cryptographically desirable properties and advantages over the typical Weierstrass form. Because the group law on an Edwards curve (normal, twisted, or binary) is complete and unified, implementations can be safer from side channel or exceptional procedure attacks. The different types of Edwards provide a better platform for cryptographic primitives, since they have more security built into them from the mathematic foundation up.
Of the three types of Edwards curves—original, twisted, and binary—there hasn't been as much work done on binary curves. We provide the necessary motivation and background, and then delve into the theory of binary Edwards curves. Next, we examine practical considerations that separate binary Edwards curves from other recently proposed normal forms. After that, we provide some of the theory for binary curves that has been worked on for other types already: pairing computations. We next explore some applications of elliptic curve and pairing-based cryptography wherein the added security of binary Edwards curves may come in handy. Finally, we finish with a discussion of e2c2, a modern C++11 library we've developed for Edwards Elliptic Curve Cryptography.
Nali, Deholo. "Hyperelliptic curves and their applications to cryptography." Thesis, University of Ottawa (Canada), 2002. http://hdl.handle.net/10393/6312.
Full textPetcher, Adam. "A Foundational Proof Framework for Cryptography." Thesis, Harvard University, 2015. http://nrs.harvard.edu/urn-3:HUL.InstRepos:17463136.
Full textEngineering and Applied Sciences - Computer Science
Bisson, Gaetan. "Endomorphism Rings in Cryptography." Phd thesis, Institut National Polytechnique de Lorraine - INPL, 2011. http://tel.archives-ouvertes.fr/tel-00609211.
Full textWright, Moriah E. "RSA, Public-Key Cryptography, and Authentication Protocols." Youngstown State University / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1339297480.
Full textBooks on the topic "Mathematics – Cryptography"
The mathematics of public key cryptography. Cambridge: Cambridge University Press, 2012.
Find full textCryptography: Diffusing the confusion. Baldock, Hertfordshire, England: Research Studies Press, 2001.
Find full textBuchmann, Johannes A. Introduction to Cryptography. New York, NY: Springer US, 2001.
Find full textLam, Kwok-Yan. Cryptography and Computational Number Theory. Basel: Birkhäuser Basel, 2001.
Find full text1955-, Pipher Jill Catherine, and Silverman Joseph H. 1955-, eds. An introduction to mathematical cryptography. New York: Springer, 2008.
Find full textGoldreich, Oded. Foundations of cryptography: Basic applications. Cambridge: Cambridge University Press, 2009.
Find full textNumber-theoretic algorithms in cryptography. Providence, R.I: American Mathematical Society, 2007.
Find full textTing-i, Pʻei, and Salomaa Arto, eds. Chinese remainder theorem: Applications in computing, coding, cryptography. Singapore: World Scientific, 1996.
Find full textMario, Pivk, and SpringerLink (Online service), eds. Applied Quantum Cryptography. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.
Find full textTakagi, Tsuyoshi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, and Yasuhiko Ikematsu, eds. International Symposium on Mathematics, Quantum Theory, and Cryptography. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-5191-8.
Full textBook chapters on the topic "Mathematics – Cryptography"
Balakrishnan, R., and Sriraman Sridharan. "Cryptography." In Discrete Mathematics, 249–77. Boca Raton : CRC Press, Taylor & Francis Group, 2019.: Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9780429486326-6.
Full textO’Regan, Gerard. "Cryptography." In Mathematics in Computing, 141–54. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4534-9_8.
Full textKoblitz, Neal. "Cryptography." In Mathematics Unlimited — 2001 and Beyond, 749–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/978-3-642-56478-9_38.
Full textWallis, W. D. "Cryptography." In Mathematics in the Real World, 157–67. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-8529-2_11.
Full textBuchmann, Johannes. "Sustainable Cryptography." In International Symposium on Mathematics, Quantum Theory, and Cryptography, 3. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5191-8_1.
Full textRousseau, Christiane, and Yvan Saint-Aubin. "Public Key Cryptography." In Mathematics and Technology, 1–31. New York, NY: Springer New York, 2008. http://dx.doi.org/10.1007/978-0-387-69216-6_7.
Full textHoffstein, Jeffrey, Jill Pipher, and Joseph H. Silverman. "Lattices and Cryptography." In Undergraduate Texts in Mathematics, 373–470. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-1711-2_7.
Full textBiggs, Norman L. "Cryptography and calculation." In Springer Undergraduate Mathematics Series, 1–16. London: Springer London, 2008. http://dx.doi.org/10.1007/978-1-84800-273-9_14.
Full textBiggs, Norman L. "Elliptic curve cryptography." In Springer Undergraduate Mathematics Series, 1–17. London: Springer London, 2008. http://dx.doi.org/10.1007/978-1-84800-273-9_15.
Full textGerstein, Larry. "Applications to cryptography." In Graduate Studies in Mathematics, 225–40. Providence, Rhode Island: American Mathematical Society, 2008. http://dx.doi.org/10.1090/gsm/090/11.
Full textConference papers on the topic "Mathematics – Cryptography"
Tsoupikova, Daria, Rong Zeng, Vera Pless, and Janet Beissinger. "Cryptography and mathematics." In ACM SIGGRAPH 2006 Research posters. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1179622.1179668.
Full textMa, Junjia. "Basic application of mathematics in cryptography." In 2020 International Conference on Modern Education and Information Management (ICMEIM). IEEE, 2020. http://dx.doi.org/10.1109/icmeim51375.2020.00192.
Full textIsmaiel, Yaseen H. "Visual cryptography for message confidentiality." In SECOND INTERNATIONAL CONFERENCE OF MATHEMATICS (SICME2019). Author(s), 2019. http://dx.doi.org/10.1063/1.5097808.
Full textTrigui, Mohamed Salim, and Daniyal M. Alghazzawi. "Interactive tools for Mathematics learning related to the cryptography." In 2011 3rd International Congress on Engineering Education (ICEED 2011). IEEE, 2011. http://dx.doi.org/10.1109/iceed.2011.6235380.
Full textAleksiene, S., M. Vaidelys, A. Aleksa, and M. Ragulskis. "Dynamic visual cryptography on deformable finite element grids." In INTERNATIONAL CONFERENCE OF NUMERICAL ANALYSIS AND APPLIED MATHEMATICS (ICNAAM 2016). Author(s), 2017. http://dx.doi.org/10.1063/1.4992606.
Full textDurcheva, Mariana I. "An application of different dioids in public key cryptography." In APPLICATIONS OF MATHEMATICS IN ENGINEERING AND ECONOMICS (AMEE'14). AIP Publishing LLC, 2014. http://dx.doi.org/10.1063/1.4902495.
Full textTahir, Faiza, Samra Nasir, and Zainab Khalid. "Privacy-Preserving Authentication Protocol based on Hybrid Cryptography for VANETs." In 2019 International Conference on Applied and Engineering Mathematics (ICAEM). IEEE, 2019. http://dx.doi.org/10.1109/icaem.2019.8853808.
Full textDurcheva, Mariana I. "Public key cryptography with max-plus matrices and polynomials." In 39TH INTERNATIONAL CONFERENCE APPLICATIONS OF MATHEMATICS IN ENGINEERING AND ECONOMICS AMEE13. AIP, 2013. http://dx.doi.org/10.1063/1.4854794.
Full textMuhammad, Khairun Nisak, and Hailiza Kamarulhaili. "Some properties of continued fraction expansions related to certain sequence of integers and its applications in elliptic curve cryptography." In PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES AND TECHNOLOGY 2018 (MATHTECH2018): Innovative Technologies for Mathematics & Mathematics for Technological Innovation. AIP Publishing, 2019. http://dx.doi.org/10.1063/1.5136360.
Full textWienardo, Fajar Yuliawan, Intan Muchtadi-Alamsyah, and Budi Rahardjo. "Implementation of Pollard Rho attack on elliptic curve cryptography over binary fields." In THE 5TH INTERNATIONAL CONFERENCE ON MATHEMATICS AND NATURAL SCIENCES. AIP Publishing LLC, 2015. http://dx.doi.org/10.1063/1.4930641.
Full text