Journal articles on the topic 'Software cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Software cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Barthe, Gilles. "High-Assurance Cryptography: Cryptographic Software We Can Trust." IEEE Security & Privacy 13, no. 5 (2015): 86–89. http://dx.doi.org/10.1109/msp.2015.112.
Full textNedjah, Nadia, and Luiza Mourelle. "Software/Hardware Co-Design of Efficient and Secure Cryptographic Hardware." JUCS - Journal of Universal Computer Science 11, no. (1) (2005): 66–82. https://doi.org/10.3217/jucs-011-01-0066.
Full textNana, Nana, and Puguh Wahyu Prasetyo. "An implementation of Hill cipher and 3x3x3 rubik's cube to enhance communication security." Bulletin of Applied Mathematics and Mathematics Education 1, no. 2 (2021): 75–92. http://dx.doi.org/10.12928/bamme.v1i2.4252.
Full textTejasweeni Pradhan. "Quantum Cryptography for Secure Autonomous Vehicle Networks." Advances in Nonlinear Variational Inequalities 28, no. 1s (2024): 449–59. https://doi.org/10.52783/anvi.v28.2445.
Full textIrawan, Muhammad Dedi. "IMPLEMENTASI KRIPTOGRAFI VIGENERE CIPHER DENGAN PHP." JURNAL TEKNOLOGI INFORMASI 1, no. 1 (2017): 11. http://dx.doi.org/10.36294/jurti.v1i1.21.
Full textNişancı, Görkem, Paul G. Flikkema, and Tolga Yalçın. "Symmetric Cryptography on RISC-V: Performance Evaluation of Standardized Algorithms." Cryptography 6, no. 3 (2022): 41. http://dx.doi.org/10.3390/cryptography6030041.
Full textFastovets, Valentyna. "Analysis and software implementation of the modified cryptographic Vernam cipher and the Caesar cipher." Vehicle and electronics. Innovative technologies, no. 20 (November 30, 2021): 62–67. http://dx.doi.org/10.30977/veit.2021.20.0.07.
Full textPaul, Sebastian, and Melanie Niethammer. "On the importance of cryptographic agility for industrial automation." at - Automatisierungstechnik 67, no. 5 (2019): 402–16. http://dx.doi.org/10.1515/auto-2019-0019.
Full textSuryateja, P. S., and K. Venkata Rao. "A Survey on Lightweight Cryptographic Algorithms in IoT." Cybernetics and Information Technologies 24, no. 1 (2024): 21–34. http://dx.doi.org/10.2478/cait-2024-0002.
Full textB S Spoorthi. "Quantum Key Generation Integration with AES Encryption for Quantum Attack Resilience." Journal of Information Systems Engineering and Management 10, no. 31s (2025): 1069–76. https://doi.org/10.52783/jisem.v10i31s.5208.
Full textGil Molk, Ali Mohammad Norouzzadeh, Mohammad Reza Aref, and Reza Ramazani Khorshiddoust. "Analysis of design goals of cryptography algorithms based on different components." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 1 (2021): 540. http://dx.doi.org/10.11591/ijeecs.v23.i1.pp540-548.
Full textMolk, Ali Mohammad Norouzzadeh Gil, Mohammad Reza Aref, and Reza Ramazani Khorshiddoust. "Analysis of design goals of cryptography algorithms based on different components." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 1 (2021): 540–48. https://doi.org/10.11591/ijeecs.v23.i1.pp540-548.
Full textChandre, Pankaj R., Bhagyashree D. Shendkar, Sayalee Deshmukh, Sameer Kakade, and Suvarna Potdukhe. "Machine Learning-Enhanced Advancements in Quantum Cryptography: A Comprehensive Review and Future Prospects." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11s (2023): 642–55. http://dx.doi.org/10.17762/ijritcc.v11i11s.8300.
Full textMcAndrew, Alasdair. "Teaching cryptography with open-source software." ACM SIGCSE Bulletin 40, no. 1 (2008): 325–29. http://dx.doi.org/10.1145/1352322.1352247.
Full textChiu, Chun-Ming, Jiaxiang Liu, Ming-Hsien Tsai, Xiaomu Shi, Bow-Yaw Wang, and Bo-Yin Yang. "Algebraic Linear Analysis for Number Theoretic Transform in Lattice-Based Cryptography." IACR Transactions on Cryptographic Hardware and Embedded Systems 2025, no. 3 (2025): 668–92. https://doi.org/10.46586/tches.v2025.i3.668-692.
Full textBelikova, Ksenia Michailovna. "The role of cryptography in ensuring cybersecurity and protecting information about technologies of strategic and advanced development in the context of protection of sci-tech achievements in the BRICS countries." Юридические исследования, no. 9 (September 2021): 22–62. http://dx.doi.org/10.25136/2409-7136.2021.9.36508.
Full textPark, Juhyun, and Yongsu Park. "Symmetric-Key Cryptographic Routine Detection in Anti-Reverse Engineered Binaries Using Hardware Tracing." Electronics 9, no. 6 (2020): 957. http://dx.doi.org/10.3390/electronics9060957.
Full textZhou, Zhen, Debiao He, Zhe Liu, Min Luo, and Kim-Kwang Raymond Choo. "A Software/Hardware Co-Design of Crystals-Dilithium Signature Scheme." ACM Transactions on Reconfigurable Technology and Systems 14, no. 2 (2021): 1–21. http://dx.doi.org/10.1145/3447812.
Full textAswad, Firas Mohammed, Ihsan Salman, and Salama A. Mostafa. "An optimization of color halftone visual cryptography scheme based on Bat algorithm." Journal of Intelligent Systems 30, no. 1 (2021): 816–35. http://dx.doi.org/10.1515/jisys-2021-0042.
Full textDrzazga, Bartosz, and Łukasz Krzywiecki. "Review of Chosen Isogeny-Based Cryptographic Schemes." Cryptography 6, no. 2 (2022): 27. http://dx.doi.org/10.3390/cryptography6020027.
Full textLee, R. B., Zhijie Shi, and Xiiao Yang. "Efficient permutation instructions for fast software cryptography." IEEE Micro 21, no. 6 (2001): 56–69. http://dx.doi.org/10.1109/40.977759.
Full textCarlson, David. "Teaching Public Key Cryptography: A Software Approach." Cybersecurity Pedagogy and Practice Journal; 3, no. 2 (2024): 12–20. http://dx.doi.org/10.62273/jjip7451.
Full textÇulha, Davut. "Modeling real world software engineering using cryptography." Computer Applications in Engineering Education 26, no. 6 (2018): 1986–91. http://dx.doi.org/10.1002/cae.21960.
Full textNurullaev, Mirkhon, and RAKHMATILLO DJURAEVICH ALOEV. "SOFTWARE, ALGORITHMS AND METHODS OF DATA ENCRYPTION BASED ON NATIONAL STANDARDS." IIUM Engineering Journal 21, no. 1 (2020): 142–66. http://dx.doi.org/10.31436/iiumej.v21i1.1179.
Full textVetri Selvan M, Gajendran N, Gururajan K, and Hari Pranava M D. "Encrypted Algorithm Detector in Cryptography." International Research Journal on Advanced Engineering and Management (IRJAEM) 3, no. 04 (2025): 1368–75. https://doi.org/10.47392/irjaem.2025.0223.
Full textPadmapriya, I., and H. Ragini. "Cloud Cryptography." International Journal of Trend in Scientific Research and Development 3, no. 2 (2019): 972–73. https://doi.org/10.31142/ijtsrd21547.
Full textNguyen, Hai Phong, and Yuhua Chen. "Lightweight, Post-Quantum Secure Cryptography Based on Ascon: Hardware Implementation in Automotive Applications." Electronics 13, no. 22 (2024): 4550. http://dx.doi.org/10.3390/electronics13224550.
Full textPushpalatha, G. S., and Ramesh S. Dr. "Collective Research Review on Chaotic Based Encryption Algorithms, Speech Encryption Algorithms and Cryptographic Requirements." International Journal of Engineering and Management Research 14, no. 2 (2024): 165–70. https://doi.org/10.5281/zenodo.11201784.
Full textZhang, Hongliang, Dongxiao Quan, Changhua Zhu, and Zhigang Li. "A Quantum Cryptography Communication Network Based on Software Defined Network." ITM Web of Conferences 17 (2018): 01008. http://dx.doi.org/10.1051/itmconf/20181701008.
Full textBrahmeshwar, Singh Umang, Narendra Kumar Upadhyay, Nagesh Sharma, and Kalpana Jaswal. "Lightweight Cryptography for Securing IoT Networks: Balancing Performance, Scalability, and Security in Resource-Constrained Environments." International Journal for Research in Applied Science and Engineering Technology 12, no. 12 (2024): 2154–60. https://doi.org/10.22214/ijraset.2024.66155.
Full textH, Soumya Babu, and Gopakumar K. "ELECTRONIC CIRCUIT REALISATION OF A CHAOTIC PSEUDO RANDOM BIT GENERATOR." ICTACT Journal on Microelectronics 7, no. 2 (2021): 1121–26. https://doi.org/10.21917/ijme.2021.0195.
Full textWang, Guangyu, Feng Liu, and Wei Qi Yan. "Basic Visual Cryptography Using Braille." International Journal of Digital Crime and Forensics 8, no. 3 (2016): 85–93. http://dx.doi.org/10.4018/ijdcf.2016070106.
Full textTANG, Xi-Jin. "Applying Dixon Resultants in Cryptography." Journal of Software 18, no. 7 (2007): 1738. http://dx.doi.org/10.1360/jos181738.
Full textKramer, Simon. "Cryptographic protocol logic: Satisfaction for (timed) Dolev–Yao cryptography." Journal of Logic and Algebraic Programming 77, no. 1-2 (2008): 60–91. http://dx.doi.org/10.1016/j.jlap.2008.05.005.
Full textPeranginangin, Andreas Perdamenta. "Application of Number Theory in Cryptography." International Journal of Educational Research Excellence (IJERE) 3, no. 1 (2024): 67–76. http://dx.doi.org/10.55299/ijere.v3i1.733.
Full textTsentseria, Oleksandra, Kateryna Hleha, Aleksandra Matiyko, and Igor Samoilov. "THE STATE OF STANDARDIZATION OF POST-QUANTUM CRYPTO-ALGORITHMS AT THE GLOBAL LEVEL." Automation of technological and business processes 15, no. 2 (2023): 66–71. http://dx.doi.org/10.15673/atbp.v15i2.2527.
Full textBluhm, Manuel, and Shay Gueron. "Fast software implementation of binary elliptic curve cryptography." Journal of Cryptographic Engineering 5, no. 3 (2015): 215–26. http://dx.doi.org/10.1007/s13389-015-0094-1.
Full textNguyen, Tat-Thang, Nhu-Quynh Luc, and Thanh Toan Dao. "Developing Secure Messaging Software using Post-Quantum Cryptography." Engineering, Technology & Applied Science Research 13, no. 6 (2023): 12440–45. http://dx.doi.org/10.48084/etasr.6549.
Full textKnudsen, Jonathan. "Java Cryptography." EDPACS 27, no. 4 (1999): 16. http://dx.doi.org/10.1201/1079/43250.27.4.19991001/30275.5.
Full textSun, Pu, Fu Song, Yuqi Chen, and Taolue Chen. "EasyBC: A Cryptography-Specific Language for Security Analysis of Block Ciphers against Differential Cryptanalysis." Proceedings of the ACM on Programming Languages 8, POPL (2024): 848–81. http://dx.doi.org/10.1145/3632871.
Full textAryanti, Aryanti, and Ikhthison Mekongga. "Implementation of Rivest Shamir Adleman Algorithm (RSA) and Vigenere Cipher In Web Based Information System." E3S Web of Conferences 31 (2018): 10007. http://dx.doi.org/10.1051/e3sconf/20183110007.
Full textDam, Duc-Thuan, Thai-Ha Tran, Van-Phuc Hoang, Cong-Kha Pham, and Trong-Thuc Hoang. "A Survey of Post-Quantum Cryptography: Start of a New Race." Cryptography 7, no. 3 (2023): 40. http://dx.doi.org/10.3390/cryptography7030040.
Full textVIDAL, G., M. S. BAPTISTA, and H. MANCINI. "FUNDAMENTALS OF A CLASSICAL CHAOS-BASED CRYPTOSYSTEM WITH SOME QUANTUM CRYPTOGRAPHY FEATURES." International Journal of Bifurcation and Chaos 22, no. 10 (2012): 1250243. http://dx.doi.org/10.1142/s0218127412502434.
Full textBhawna Garg. "Investigations on Application of Probabilistic and Mathematical Computing in Design and Statistical Analysis of Lightweight Cryptography." Communications on Applied Nonlinear Analysis 31, no. 2 (2024): 311–30. http://dx.doi.org/10.52783/cana.v31.571.
Full textBennett, Charles H., François Bessette, Gilles Brassard, Louis Salvail, and John Smolin. "Experimental quantum cryptography." Journal of Cryptology 5, no. 1 (1992): 3–28. http://dx.doi.org/10.1007/bf00191318.
Full textDolmeta, Alessandra, Maurizio Martina, and Guido Masera. "Comparative Study of Keccak SHA-3 Implementations." Cryptography 7, no. 4 (2023): 60. http://dx.doi.org/10.3390/cryptography7040060.
Full textGanley, Michael. "Introduction – Cryptography." Information Security Technical Report 11, no. 2 (2006): 67. http://dx.doi.org/10.1016/j.istr.2006.03.005.
Full textShaik, Cheman. "Preventing Counterfeit Products using Cryptography, QR Code and Webservice." Computer Science & Engineering: An International Journal 11, no. 1 (2021): 1–11. http://dx.doi.org/10.5121/cseij.2021.11101.
Full textRanđelović, Dragan, Miloš Ranđelović, and Željko Kuzmanović. "Practical application of open source software tools in cryptography." Nauka, bezbednost, policija, no. 2 (2014): 115–35. http://dx.doi.org/10.5937/nbp1402115r.
Full textSeo, Hwajeong. "Compact Software Implementation of Public-Key Cryptography on MSP430X." ACM Transactions on Embedded Computing Systems 17, no. 3 (2018): 1–12. http://dx.doi.org/10.1145/3190855.
Full text