Academic literature on the topic 'Software cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Software cryptography"
Barthe, Gilles. "High-Assurance Cryptography: Cryptographic Software We Can Trust." IEEE Security & Privacy 13, no. 5 (2015): 86–89. http://dx.doi.org/10.1109/msp.2015.112.
Full textNedjah, Nadia, and Luiza Mourelle. "Software/Hardware Co-Design of Efficient and Secure Cryptographic Hardware." JUCS - Journal of Universal Computer Science 11, no. (1) (2005): 66–82. https://doi.org/10.3217/jucs-011-01-0066.
Full textNana, Nana, and Puguh Wahyu Prasetyo. "An implementation of Hill cipher and 3x3x3 rubik's cube to enhance communication security." Bulletin of Applied Mathematics and Mathematics Education 1, no. 2 (2021): 75–92. http://dx.doi.org/10.12928/bamme.v1i2.4252.
Full textTejasweeni Pradhan. "Quantum Cryptography for Secure Autonomous Vehicle Networks." Advances in Nonlinear Variational Inequalities 28, no. 1s (2024): 449–59. https://doi.org/10.52783/anvi.v28.2445.
Full textIrawan, Muhammad Dedi. "IMPLEMENTASI KRIPTOGRAFI VIGENERE CIPHER DENGAN PHP." JURNAL TEKNOLOGI INFORMASI 1, no. 1 (2017): 11. http://dx.doi.org/10.36294/jurti.v1i1.21.
Full textNişancı, Görkem, Paul G. Flikkema, and Tolga Yalçın. "Symmetric Cryptography on RISC-V: Performance Evaluation of Standardized Algorithms." Cryptography 6, no. 3 (2022): 41. http://dx.doi.org/10.3390/cryptography6030041.
Full textFastovets, Valentyna. "Analysis and software implementation of the modified cryptographic Vernam cipher and the Caesar cipher." Vehicle and electronics. Innovative technologies, no. 20 (November 30, 2021): 62–67. http://dx.doi.org/10.30977/veit.2021.20.0.07.
Full textPaul, Sebastian, and Melanie Niethammer. "On the importance of cryptographic agility for industrial automation." at - Automatisierungstechnik 67, no. 5 (2019): 402–16. http://dx.doi.org/10.1515/auto-2019-0019.
Full textSuryateja, P. S., and K. Venkata Rao. "A Survey on Lightweight Cryptographic Algorithms in IoT." Cybernetics and Information Technologies 24, no. 1 (2024): 21–34. http://dx.doi.org/10.2478/cait-2024-0002.
Full textB S Spoorthi. "Quantum Key Generation Integration with AES Encryption for Quantum Attack Resilience." Journal of Information Systems Engineering and Management 10, no. 31s (2025): 1069–76. https://doi.org/10.52783/jisem.v10i31s.5208.
Full textDissertations / Theses on the topic "Software cryptography"
Kultinov, Kirill. "Software Implementations and Applications of Elliptic Curve Cryptography." Wright State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright1559232475298514.
Full textLo, Johnny Li-Chang. "A framework for cryptography algorithms on mobile devices." Diss., University of Pretoria, 2007. http://hdl.handle.net/2263/28849.
Full textWootten, David Raiman. "A graphic user interface for rapid integration of steganography software." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA309681.
Full textBartzia, Evmorfia-Iro. "A formalization of elliptic curves for cryptography." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLX002/document.
Full textGalissant, Pierre. "Contributions to white-box cryptography : models and algebraic constructions." Electronic Thesis or Diss., université Paris-Saclay, 2023. http://www.theses.fr/2023UPASG099.
Full textFrid, Jonas. "Security Critical Systems in Software." Thesis, Linköpings universitet, Informationskodning, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-61588.
Full textBommireddipalli, Nithesh Venkata Ramana Surya. "Tutorial on Elliptic Curve Arithmetic and Introduction to Elliptic Curve Cryptography (ECC)." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1511866832906148.
Full textGouvêa, Conrado Porto Lopes 1984. "Software implementation of cryptography for wireless sensors and mobile processors = Implementação em software de criptografia para sensores sem fio e processadores móveis." [s.n.], 2013. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275612.
Full textGalassi, De Orchi Tommaso. "A Security Study for Non-Internet Connected Managed Software." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-99047.
Full textEldib, Hassan Shoukry. "Constraint Based Program Synthesis for Embedded Software." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/55120.
Full textBooks on the topic "Software cryptography"
Wootten, David Raiman. A graphic user interface for rapid integration of steganography software. Naval Postgraduate School, 1996.
Find full textMicciancio, Daniele. Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings. Springer Berlin Heidelberg, 2010.
Find full textIshai, Yuval. Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings. International Association for Cryptologic Research, 2011.
Find full textDesmedt, Yvo G. Public Key Cryptography -- PKC 2003: 6th International Workshop on Practice and Theory in Public Key Cryptography Miami, FL, USA, January 6-8, 2003 Proceedings. Springer-Verlag Berlin Heidelberg, 2002.
Find full textSahai, Amit. Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Springer Berlin Heidelberg, 2013.
Find full textCatalano, Dario. Public Key Cryptography – PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings. International Association for Cryptologic Research, 2011.
Find full textservice), SpringerLink (Online, ed. Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textUnited, States Congress House Committee on Foreign Affairs Subcommittee on Economic Policy Trade and Environment. Export controls on mass market software: Hearing before the Subcommittee on Economic Policy, Trade, and Environment of the Committee on Foreign Affairs, House of Representatives, One Hundred Third Congress, first session, October 12, 1993. U.S. G.P.O., 1994.
Find full textJasvir, Nagra, ed. Surreptitious software: Obfuscation, watermarking, and tamperproofing for program protection. Addison-Wesley, 2009.
Find full textBook chapters on the topic "Software cryptography"
van Oorschot, Paul C. "Malicious Software." In Information Security and Cryptography. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-33649-3_7.
Full textvan Oorschot, Paul C. "Malicious Software." In Information Security and Cryptography. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-83411-1_7.
Full textBarbosa, Manuel, Andrew Moss, Dan Page, Nuno F. Rodrigues, and Paulo F. Silva. "Type Checking Cryptography Implementations." In Fundamentals of Software Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29320-7_21.
Full textAumasson, Jean-Philippe, Willi Meier, Raphael C. W. Phan, and Luca Henzen. "BLAKE in Software." In Information Security and Cryptography. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-44757-4_5.
Full textHoepman, Jaap-Henk. "Secret Key Authentication with Software-Only Verification." In Financial Cryptography. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45472-1_21.
Full textBroadbent, Anne, Stacey Jeffery, Sébastien Lord, Supartha Podder, and Aarthi Sundaram. "Secure Software Leasing Without Assumptions." In Theory of Cryptography. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90459-3_4.
Full textKitagawa, Fuyuki, Ryo Nishimaki, and Takashi Yamakawa. "Secure Software Leasing from Standard Assumptions." In Theory of Cryptography. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90459-3_2.
Full textSasdrich, Pascal, Amir Moradi, and Tim Güneysu. "White-Box Cryptography in the Gray Box." In Fast Software Encryption. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-52993-5_10.
Full textNoilhan, Fabrice. "Software Optimization of Decorrelation Module." In Selected Areas in Cryptography. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-46513-8_13.
Full textGüneysu, Tim, Tobias Oder, Thomas Pöppelmann, and Peter Schwabe. "Software Speed Records for Lattice-Based Signatures." In Post-Quantum Cryptography. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38616-9_5.
Full textConference papers on the topic "Software cryptography"
Benabdelhafid, Maya, Kamel Adi, Omer Timo, and Luigi Logrippo. "Hierarchical Colored Petri Nets for Vulnerability Detection in Software Architectures." In 22nd International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013638700003979.
Full textHernández-Marcial, Bryan-Josué, Xavier Limón, Ángel J. Sánchez-García, and Juan Carlos Pérez-Arriaga. "Secure Cryptography Usage in Software Development: A Systematic Literature Review." In 2024 12th International Conference in Software Engineering Research and Innovation (CONISOFT). IEEE, 2024. https://doi.org/10.1109/conisoft63288.2024.00036.
Full textRahartomo, Argianto, Harpreet Kaur, and Mohammad Ghafari. "Gameful Introduction to Cryptography for Dyslexic Students." In 2024 36th International Conference on Software Engineering Education and Training (CSEE&T). IEEE, 2024. http://dx.doi.org/10.1109/cseet62301.2024.10663005.
Full textKhan, Mohsin, Håvard Dagenborg, and Dag Johansen. "Software Benchmarking of NIST Lightweight Hash Function Finalists on Resource-Constrained AVR Platform via ChipWhisperer." In 22nd International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013560700003979.
Full textGoudjil, Aya, Lylia Djilali, Amira Benabdelmoumene, M'hamed Hamadouche, and Mohamed Amine Riahla. "Digital Data Protection Using Feistel Network and DNA Cryptography." In 2024 International Conference on Advanced Aspects of Software Engineering (ICAASE). IEEE, 2024. https://doi.org/10.1109/icaase64542.2024.10851030.
Full textRodrigues, Gustavo Eloi de P., Alexandre M. Braga, and Ricardo Dahab. "A machine learning approach to detect misuse of cryptographic APIs in source code." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19223.
Full textBraga, Alexandre, and Ricardo Dahab. "A Longitudinal and Retrospective Study on How Developers Misuse Cryptography in Online Communities." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/sbseg.2017.19488.
Full textMcAndrew, Alasdair. "Teaching cryptography with open-source software." In the 39th SIGCSE technical symposium. ACM Press, 2008. http://dx.doi.org/10.1145/1352135.1352247.
Full textDodis, Yevgeniy, Weiliang Luo, Shouhuai Xu, and Moti Yung. "Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software." In the 7th ACM Symposium. ACM Press, 2012. http://dx.doi.org/10.1145/2414456.2414489.
Full textvan der Linden, Dirk, Awais Rashid, Emma Williams, and Bogdan Warinschi. "Safe cryptography for all." In ICSE '18: 40th International Conference on Software Engineering. ACM, 2018. http://dx.doi.org/10.1145/3194707.3194709.
Full textReports on the topic "Software cryptography"
Taiber, Joachim. Unsettled Topics Concerning the Impact of Quantum Technologies on Automotive Cybersecurity. SAE International, 2020. http://dx.doi.org/10.4271/epr2020026.
Full textGudimov, V. N., and S. G. Samochvalova. Software visualization of cryptographic protection methods. Ailamazyan Program Systems Institute of Russian Academy of Sciences, 2025. https://doi.org/10.12731/ofernio.2025.25460.
Full text