Academic literature on the topic 'Software cryptography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software cryptography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Software cryptography"

1

Barthe, Gilles. "High-Assurance Cryptography: Cryptographic Software We Can Trust." IEEE Security & Privacy 13, no. 5 (2015): 86–89. http://dx.doi.org/10.1109/msp.2015.112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nedjah, Nadia, and Luiza Mourelle. "Software/Hardware Co-Design of Efficient and Secure Cryptographic Hardware." JUCS - Journal of Universal Computer Science 11, no. (1) (2005): 66–82. https://doi.org/10.3217/jucs-011-01-0066.

Full text
Abstract:
Most cryptography systems are based on the modular exponentiation to perform the non-linear scrambling operation of data. It is performed using successive modular multiplications, which are time consuming for large operands. Accelerating cryptography needs optimising the time consumed by a single modular multiplication and/or reducing the total number of modular multiplications performed. Using a genetic algorithm, we first yield the minimal sequence of powers, generally called addition chain, that need to be computed to finally obtain the modular exponentiation result. Then, we exploit the co
APA, Harvard, Vancouver, ISO, and other styles
3

Nana, Nana, and Puguh Wahyu Prasetyo. "An implementation of Hill cipher and 3x3x3 rubik's cube to enhance communication security." Bulletin of Applied Mathematics and Mathematics Education 1, no. 2 (2021): 75–92. http://dx.doi.org/10.12928/bamme.v1i2.4252.

Full text
Abstract:
Message security is must be managed seriously. Therefore, to maintain the confidentiality of any message, cryptography is needed. Cryptography is a science that uses mathematics to encrypt and decrypt messages. Cryptography is used as a tool to protect messages, for example, national secrets and strategies. The method of this research is qualitative research with a literature review. This research implements a hybrid cryptographic algorithm by combining Hill cipher and 3x3x3 Rubik's cube methods with Python software simulation.
APA, Harvard, Vancouver, ISO, and other styles
4

Tejasweeni Pradhan. "Quantum Cryptography for Secure Autonomous Vehicle Networks." Advances in Nonlinear Variational Inequalities 28, no. 1s (2024): 449–59. https://doi.org/10.52783/anvi.v28.2445.

Full text
Abstract:
As autonomous vehicle networks evolve, securing them against advanced cyber threats is becoming increasingly crucial. Traditional cryptographic methods are inadequate for these demands. This paper examines quantum cryptography, focusing on Quantum Key Distribution (QKD), to enhance security in these networks. A network architecture incorporating quantum cryptographic protocols, and an outline of the necessary hardware and software are proposed. Simulations demonstrate the advantages of quantum cryptography in ensuring data integrity, confidentiality, and authenticity. However, challenges such
APA, Harvard, Vancouver, ISO, and other styles
5

Irawan, Muhammad Dedi. "IMPLEMENTASI KRIPTOGRAFI VIGENERE CIPHER DENGAN PHP." JURNAL TEKNOLOGI INFORMASI 1, no. 1 (2017): 11. http://dx.doi.org/10.36294/jurti.v1i1.21.

Full text
Abstract:
Abstract - This research was conducted to create a cryptographic implementation of vigenere ciphers. This system is designed by analyzing the descriptive method, and the comparative method. After analysis, modeling is done with UML (Unified Modeling Language) and the design of vigenere cipher cryptography system with text encryption and decryption can be programmed using PHP software. The results of this study are an implementation of the vigenere cipher cryptographic system with PHP. Keywords - Cryptography, Vigenere Cipher, Encryption - Decryption, Text, PHP.
APA, Harvard, Vancouver, ISO, and other styles
6

Nişancı, Görkem, Paul G. Flikkema, and Tolga Yalçın. "Symmetric Cryptography on RISC-V: Performance Evaluation of Standardized Algorithms." Cryptography 6, no. 3 (2022): 41. http://dx.doi.org/10.3390/cryptography6030041.

Full text
Abstract:
The ever-increasing need for securing computing systems using cryptographic algorithms is spurring interest in the efficient implementation of common algorithms. While the algorithms can be implemented in software using base instruction sets, there is considerable potential to reduce memory cost and improve speed using specialized instructions and associated hardware. However, there is a need to assess the benefits and costs of software implementations and new instructions that implement key cryptographic algorithms in fewer cycles. The primary aim of this paper is to improve the understanding
APA, Harvard, Vancouver, ISO, and other styles
7

Fastovets, Valentyna. "Analysis and software implementation of the modified cryptographic Vernam cipher and the Caesar cipher." Vehicle and electronics. Innovative technologies, no. 20 (November 30, 2021): 62–67. http://dx.doi.org/10.30977/veit.2021.20.0.07.

Full text
Abstract:
Problem. Modern cryptography is a very important part of cybersecurity and confidentiality of many operations. It covers almost all parts of our lives, from e-commerce to specialized education of students. Goal. The advantage of symmetric key cryptography is that working with this method is very easy for users, as one key is used for encryption, as well as for decryption purposes, and this key must be secret and should be known only to the sender and recipient and no one else. On the other hand, public key cryptography has two keys. Unfortunately, this exposes the inherent security flaws, as t
APA, Harvard, Vancouver, ISO, and other styles
8

Paul, Sebastian, and Melanie Niethammer. "On the importance of cryptographic agility for industrial automation." at - Automatisierungstechnik 67, no. 5 (2019): 402–16. http://dx.doi.org/10.1515/auto-2019-0019.

Full text
Abstract:
AbstractCryptographic primitives do not remain secure, they deteriorate over time. On the one hand increasing computing power leads to more powerful attacks on their underlying mathematical problems. On the other hand quantum computing threatens to break many widely used cryptographic primitives. The main goal ofcryptographic agilityis to enable an easy transition to alternative cryptographic schemes. Considering the long lifetime of products within industrial automation, we argue that vendors should strive for cryptographic agility in their products. In this work we motivate cryptographic agi
APA, Harvard, Vancouver, ISO, and other styles
9

Suryateja, P. S., and K. Venkata Rao. "A Survey on Lightweight Cryptographic Algorithms in IoT." Cybernetics and Information Technologies 24, no. 1 (2024): 21–34. http://dx.doi.org/10.2478/cait-2024-0002.

Full text
Abstract:
Abstract The Internet of Things (IoT) will soon penetrate every aspect of human life. Several threats and vulnerabilities are present due to the different devices and protocols used in an IoT system. Conventional cryptographic primitives or algorithms cannot run efficiently and are unsuitable for resource-constrained devices in IoT. Hence, a recently developed area of cryptography, known as lightweight cryptography, has been introduced, and over the years, numerous lightweight algorithms have been suggested. This paper gives a comprehensive overview of the lightweight cryptography field and co
APA, Harvard, Vancouver, ISO, and other styles
10

B S Spoorthi. "Quantum Key Generation Integration with AES Encryption for Quantum Attack Resilience." Journal of Information Systems Engineering and Management 10, no. 31s (2025): 1069–76. https://doi.org/10.52783/jisem.v10i31s.5208.

Full text
Abstract:
Quantum cryptography, with the chance of advancement offered by its basis on the single principle of quantum mechanics, constitutes a notable point of strength in the advancement of new cryptography research. Utilizing the distinctive properties of quantum mechanism, such as qubits, quantum cryptography offers enhanced protection against quantum computer attacks. This paper proposes a novel quantum cryptographic algorithm that integrates quantum key generation with the Advanced Encryption Standard (AES) technique to safeguard data from quantum threats. By combining quantum bit generation with
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Software cryptography"

1

Kultinov, Kirill. "Software Implementations and Applications of Elliptic Curve Cryptography." Wright State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright1559232475298514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lo, Johnny Li-Chang. "A framework for cryptography algorithms on mobile devices." Diss., University of Pretoria, 2007. http://hdl.handle.net/2263/28849.

Full text
Abstract:
Mobile communication devices have become a popular tool for gathering and disseminating information and data. With the evidence of the growth of wireless technology and a need for more flexible, customizable and better-optimised security schemes, it is evident that connection-based security such as HTTPS may not be sufficient. In order to provide sufficient security at the application layer, developers need access to a cryptography package. Such packages are available as third party mobile cryptographic toolkits or are supported natively on the mobile device. Typically mobile cryptographic pac
APA, Harvard, Vancouver, ISO, and other styles
3

Wootten, David Raiman. "A graphic user interface for rapid integration of steganography software." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA309681.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bartzia, Evmorfia-Iro. "A formalization of elliptic curves for cryptography." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLX002/document.

Full text
Abstract:
Le sujet de ma thèse s’inscrit dans le domaine des preuves formelleset de la vérification des algorithmescryptographiques. L’implémentation des algorithmes cryptographiquesest souvent une tâche assez compliquée, parce qu’ils sont optimiséspour être efficaces et sûrs en même temps. Par conséquent, il n’estpas toujours évident qu’un programme cryptographique en tant quefonction, corresponde exactement à l’algorithme mathématique,c’est-à-dire que le programme soit correct. Les erreurs dans lesprogrammes cryptographiques peuvent mettre en danger la sécurité desystèmes cryptographiques entiers et d
APA, Harvard, Vancouver, ISO, and other styles
5

Galissant, Pierre. "Contributions to white-box cryptography : models and algebraic constructions." Electronic Thesis or Diss., université Paris-Saclay, 2023. http://www.theses.fr/2023UPASG099.

Full text
Abstract:
Du fait de la démocratisation detechnologies telles que le paiement par mobile oul'essor des technologies basées sur la blockchain, lesbesoins d'implémentations sécurisées dans le modèleboîte blanche d'algorithmes standardisés sont de plusen plus conséquents dans l'industrie. Malgré cesbesoins, très peu de nouveaux designs sont proposésdans la littérature. Pour ne pas avoir à utiliser desimplémentations aux designs non publics, denouvelles techniques d'implémentations doivent êtreproposées et étudiées.Ce manuscrit commence par un guide pour lacryptographie boîte blanche. Son but est de réviser
APA, Harvard, Vancouver, ISO, and other styles
6

Frid, Jonas. "Security Critical Systems in Software." Thesis, Linköpings universitet, Informationskodning, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-61588.

Full text
Abstract:
Sectra Communications is today developing cryptographic products for high assurance environments with rigorous requirements on separation between encrypted and un-encrypted data. This separation has traditionally been achieved through the use of physically distinct hardware components, leading to larger products which require more power and cost more to produce compared to systems where lower assurance is required. An alternative to hardware separation has emerged thanks to a new class of operating systems based on the "separation kernel" concept, which offers verifiable separation between sof
APA, Harvard, Vancouver, ISO, and other styles
7

Bommireddipalli, Nithesh Venkata Ramana Surya. "Tutorial on Elliptic Curve Arithmetic and Introduction to Elliptic Curve Cryptography (ECC)." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1511866832906148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gouvêa, Conrado Porto Lopes 1984. "Software implementation of cryptography for wireless sensors and mobile processors = Implementação em software de criptografia para sensores sem fio e processadores móveis." [s.n.], 2013. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275612.

Full text
Abstract:
Orientador: Julio César López Hernández<br>Tese (doutorado) - Universidade Estadual de Campinas, Instituto de Computação<br>Made available in DSpace on 2018-08-24T00:18:34Z (GMT). No. of bitstreams: 1 Gouvea_ConradoPortoLopes_D.pdf: 3342900 bytes, checksum: b3a072bdbc369f1a1fffd95e1c1f4365 (MD5) Previous issue date: 2013<br>Resumo: A implementação eficiente e segura de esquemas criptográficos é um aspecto importante da criptografia aplicada. Neste trabalho, foca-se na implementação em software de algoritmos relevantes da criptografia de curvas elípticas (CCE), criptografia baseada em emparel
APA, Harvard, Vancouver, ISO, and other styles
9

Galassi, De Orchi Tommaso. "A Security Study for Non-Internet Connected Managed Software." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-99047.

Full text
Abstract:
This master thesis project aims to improve the security of managed software developed at SCANIA's research and development group NEVE. The thesis will present several security schemes that can be effective against tampering, theft, and reverse engineering of application. The schemes presented were selected to ensure confidentiality, integrity, authenticity, and authentication of applications. NEVE’s software will be analyzed and compared against state of the art solutions. A theoretical threat analysis will be presented, corroborated by empirical reverse engineering attacks. The final part of
APA, Harvard, Vancouver, ISO, and other styles
10

Eldib, Hassan Shoukry. "Constraint Based Program Synthesis for Embedded Software." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/55120.

Full text
Abstract:
In the world that we live in today, we greatly rely on software in nearly every aspect of our lives. In many critical applications, such as in transportation and medical systems, catastrophic consequences could occur in case of buggy software. As the computational power and storage capacity of computer hardware keep increasing, so are the size and complexity of the software. This makes testing and verification increasingly challenging in practice, and consequentially creates a chance for software with critical bugs to find their way into the consumer market. In this dissertation, I present a
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Software cryptography"

1

Moyle, Ed. Cryptographic libraries for developers. Charles River Media, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wootten, David Raiman. A graphic user interface for rapid integration of steganography software. Naval Postgraduate School, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Micciancio, Daniele. Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings. Springer Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ishai, Yuval. Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings. International Association for Cryptologic Research, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Desmedt, Yvo G. Public Key Cryptography -- PKC 2003: 6th International Workshop on Practice and Theory in Public Key Cryptography Miami, FL, USA, January 6-8, 2003 Proceedings. Springer-Verlag Berlin Heidelberg, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sahai, Amit. Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Catalano, Dario. Public Key Cryptography – PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings. International Association for Cryptologic Research, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

service), SpringerLink (Online, ed. Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United, States Congress House Committee on Foreign Affairs Subcommittee on Economic Policy Trade and Environment. Export controls on mass market software: Hearing before the Subcommittee on Economic Policy, Trade, and Environment of the Committee on Foreign Affairs, House of Representatives, One Hundred Third Congress, first session, October 12, 1993. U.S. G.P.O., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jasvir, Nagra, ed. Surreptitious software: Obfuscation, watermarking, and tamperproofing for program protection. Addison-Wesley, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Software cryptography"

1

van Oorschot, Paul C. "Malicious Software." In Information Security and Cryptography. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-33649-3_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

van Oorschot, Paul C. "Malicious Software." In Information Security and Cryptography. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-83411-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Barbosa, Manuel, Andrew Moss, Dan Page, Nuno F. Rodrigues, and Paulo F. Silva. "Type Checking Cryptography Implementations." In Fundamentals of Software Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29320-7_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Aumasson, Jean-Philippe, Willi Meier, Raphael C. W. Phan, and Luca Henzen. "BLAKE in Software." In Information Security and Cryptography. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-44757-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hoepman, Jaap-Henk. "Secret Key Authentication with Software-Only Verification." In Financial Cryptography. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45472-1_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Broadbent, Anne, Stacey Jeffery, Sébastien Lord, Supartha Podder, and Aarthi Sundaram. "Secure Software Leasing Without Assumptions." In Theory of Cryptography. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90459-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kitagawa, Fuyuki, Ryo Nishimaki, and Takashi Yamakawa. "Secure Software Leasing from Standard Assumptions." In Theory of Cryptography. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90459-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sasdrich, Pascal, Amir Moradi, and Tim Güneysu. "White-Box Cryptography in the Gray Box." In Fast Software Encryption. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-52993-5_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Noilhan, Fabrice. "Software Optimization of Decorrelation Module." In Selected Areas in Cryptography. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-46513-8_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Güneysu, Tim, Tobias Oder, Thomas Pöppelmann, and Peter Schwabe. "Software Speed Records for Lattice-Based Signatures." In Post-Quantum Cryptography. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38616-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Software cryptography"

1

Benabdelhafid, Maya, Kamel Adi, Omer Timo, and Luigi Logrippo. "Hierarchical Colored Petri Nets for Vulnerability Detection in Software Architectures." In 22nd International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013638700003979.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hernández-Marcial, Bryan-Josué, Xavier Limón, Ángel J. Sánchez-García, and Juan Carlos Pérez-Arriaga. "Secure Cryptography Usage in Software Development: A Systematic Literature Review." In 2024 12th International Conference in Software Engineering Research and Innovation (CONISOFT). IEEE, 2024. https://doi.org/10.1109/conisoft63288.2024.00036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rahartomo, Argianto, Harpreet Kaur, and Mohammad Ghafari. "Gameful Introduction to Cryptography for Dyslexic Students." In 2024 36th International Conference on Software Engineering Education and Training (CSEE&T). IEEE, 2024. http://dx.doi.org/10.1109/cseet62301.2024.10663005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Khan, Mohsin, Håvard Dagenborg, and Dag Johansen. "Software Benchmarking of NIST Lightweight Hash Function Finalists on Resource-Constrained AVR Platform via ChipWhisperer." In 22nd International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013560700003979.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Goudjil, Aya, Lylia Djilali, Amira Benabdelmoumene, M'hamed Hamadouche, and Mohamed Amine Riahla. "Digital Data Protection Using Feistel Network and DNA Cryptography." In 2024 International Conference on Advanced Aspects of Software Engineering (ICAASE). IEEE, 2024. https://doi.org/10.1109/icaase64542.2024.10851030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rodrigues, Gustavo Eloi de P., Alexandre M. Braga, and Ricardo Dahab. "A machine learning approach to detect misuse of cryptographic APIs in source code." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19223.

Full text
Abstract:
Cryptography is an indispensable tool for achieving security requirements such as software security. However, most software developers do not have enough knowledge regarding the proper use of cryptography and its APIs. This leads to incorrect use and exploitable vulnerabilities in software applications. Here, we propose an approach based on machine learning techniques to detect different kinds of cryptographic misuse in known java source code representations, achieving an average 52 percentage points improvement with respect to previous works.
APA, Harvard, Vancouver, ISO, and other styles
7

Braga, Alexandre, and Ricardo Dahab. "A Longitudinal and Retrospective Study on How Developers Misuse Cryptography in Online Communities." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/sbseg.2017.19488.

Full text
Abstract:
Software developers participating in online communities benefit from quick solutions to technology specific issues and, eventually, get better in troubleshooting technology malfunctioning. In this work, we investigate whether developers who are part of online communities for cryptography programming are getting better in using cryptography with time. This is a crucial issue nowadays, when "real-world crypto" is becoming a topic of serious investigation, not only academically but in security management as a whole: cryptographic programming handled by non-specialists is an important and often in
APA, Harvard, Vancouver, ISO, and other styles
8

McAndrew, Alasdair. "Teaching cryptography with open-source software." In the 39th SIGCSE technical symposium. ACM Press, 2008. http://dx.doi.org/10.1145/1352135.1352247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dodis, Yevgeniy, Weiliang Luo, Shouhuai Xu, and Moti Yung. "Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software." In the 7th ACM Symposium. ACM Press, 2012. http://dx.doi.org/10.1145/2414456.2414489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

van der Linden, Dirk, Awais Rashid, Emma Williams, and Bogdan Warinschi. "Safe cryptography for all." In ICSE '18: 40th International Conference on Software Engineering. ACM, 2018. http://dx.doi.org/10.1145/3194707.3194709.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Software cryptography"

1

Taiber, Joachim. Unsettled Topics Concerning the Impact of Quantum Technologies on Automotive Cybersecurity. SAE International, 2020. http://dx.doi.org/10.4271/epr2020026.

Full text
Abstract:
Quantum computing is considered the “next big thing” when it comes to solving computational problems impossible to tackle using conventional computers. However, a major concern is that quantum computers could be used to crack current cryptographic schemes designed to withstand traditional cyberattacks. This threat also impacts future automated vehicles as they become embedded in a vehicle-to-everything (V2X) ecosystem. In this scenario, encrypted data is transmitted between a complex network of cloud-based data servers, vehicle-based data servers, and vehicle sensors and controllers. While the
APA, Harvard, Vancouver, ISO, and other styles
2

Gudimov, V. N., and S. G. Samochvalova. Software visualization of cryptographic protection methods. Ailamazyan Program Systems Institute of Russian Academy of Sciences, 2025. https://doi.org/10.12731/ofernio.2025.25460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!