Literatura académica sobre el tema "Secret-key cryptography"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Secret-key cryptography".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Secret-key cryptography"
Liu, Shuiyin, Yi Hong, and Emanuele Viterbo. "Unshared Secret Key Cryptography." IEEE Transactions on Wireless Communications 13, no. 12 (2014): 6670–83. http://dx.doi.org/10.1109/twc.2014.2364022.
Texto completoGirija, Rani Suthoju, and Suresh babu M. "Cryptographic Services to Enforce Secure Messaging and Data Storage." International Journal of Innovative Science and Research Technology 7, no. 11 (2022): 1693–96. https://doi.org/10.5281/zenodo.7478875.
Texto completoNAGY, NAYA, MARIUS NAGY, and SELIM G. AKL. "KEY DISTRIBUTION VERSUS KEY ENHANCEMENT IN QUANTUM CRYPTOGRAPHY." Parallel Processing Letters 20, no. 03 (2010): 239–50. http://dx.doi.org/10.1142/s0129626410000193.
Texto completoJoye, Marc, and Sung-Ming Yen. "ID-based secret-key cryptography." ACM SIGOPS Operating Systems Review 32, no. 4 (1998): 33–39. http://dx.doi.org/10.1145/302350.302359.
Texto completoKak, S. C. "Secret-hardware public-key cryptography." IEE Proceedings E Computers and Digital Techniques 133, no. 2 (1986): 94. http://dx.doi.org/10.1049/ip-e.1986.0010.
Texto completoSeptafiansyah, Dwi Putra, Yudhiprawira Mario, Sutikno Sarwono, Kurniawan Yusuf, and Suwandi Ahmad Adang. "Power analysis attack against encryption devices: a comprehensive analysis of AES, DES, and BC3." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 3 (2019): 1282–89. https://doi.org/10.12928/TELKOMNIKA.v17i3.9384.
Texto completoMakeri, Yakubu Ajiji. "INTEGRATED CRYPTOGRAPHICAL ACCESS CONTROL OVER NETWORK PROJECT." Acta Informatica Malaysia 4, no. 1 (2020): 19–21. http://dx.doi.org/10.26480/aim.01.2020.19.21.
Texto completoPallavi, Vijay Chavan, Mohammad Atique Dr., and Latesh Malik Dr. "Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares." International Journal of Network Security & Its Applications (IJNSA) 6, no. 1 (2014): 91–102. https://doi.org/10.5281/zenodo.6471758.
Texto completoSagala, Sarah. "Application of Diffie-Hellman Algorithm Method (Key-Exchange) in Cryptography." Login : Jurnal Teknologi Komputer 18, no. 02 (2024): 114–19. https://doi.org/10.58471/login.v18i02.114.
Texto completoDubey, Praveer, and Ompal Yadav. "A Survey on Quantum cryptography versus classical Cryptography." International Journal of Current Engineering and Technology 10, no. 06 (2021): 910–13. http://dx.doi.org/10.14741/ijcet/v.10.6.3.
Texto completoTesis sobre el tema "Secret-key cryptography"
Fokin, Dennis. "A secure multi-party scheme with certificateless cryptography for secret key extraction." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-231574.
Texto completoQuist, Britton T. "Improved Channel Probing for Secret Key Generation with Multiple Antenna Systems." BYU ScholarsArchive, 2013. https://scholarsarchive.byu.edu/etd/3554.
Texto completoChen, Chan. "Secret Key Establishment Using Wireless Channels as Common Randomness in Time-Variant MIMO Systems." Diss., CLICK HERE for online access, 2010. http://contentdm.lib.byu.edu/ETD/image/etd3532.pdf.
Texto completoOlsson, Fredrik. "A Lab System for Secret Sharing." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2385.
Texto completoTu, Zhiqi. "Enhancements of the Non-linear Knapsack Cryptosystem." Thesis, University of Canterbury. Computer Science and Software Engineering, 2006. http://hdl.handle.net/10092/1080.
Texto completoValkaitis, Mindaugas. "Efektyvios šifravimo bei skaitmeninio parašo sistemos." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20140704_171717-30545.
Texto completoWen, Wen. "Energy Efficient Secure Key Management Schemes for WSNs and IoT." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35257.
Texto completoFrixons, Paul. "Cryptographie à clé secrète et attaquant quantique dans le monde des télécommunications." Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS339.
Texto completoAzfar, Abdullah. "Multiple Escrow Agents in VoIP." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10895.
Texto completoRiahinia, Mahshid. "Constrained Pseudorandom Functions : New Constructions and Connections with Secure Computation." Electronic Thesis or Diss., Lyon, École normale supérieure, 2024. http://www.theses.fr/2024ENSL0022.
Texto completoLibros sobre el tema "Secret-key cryptography"
Galbreath, Nick. Cryptography for Internet and database applications: Developing secret and public key techniques with Java. Wiley Pub., 2002.
Buscar texto completo1943-, Spector Ronald H., ed. Listening to the enemy: Key documents on the role of communications intelligence in the war with Japan. Scholarly Resources Inc., 1988.
Buscar texto completoAssche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, 2006.
Buscar texto completoAssche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, 2010.
Buscar texto completoAssche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. University of Cambridge ESOL Examinations, 2012.
Buscar texto completoAssche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, 2012.
Buscar texto completoQUANTUM CRYPTOGRAPHY AND SECRET-KEY DISTILLATION. CAMBRIDGE UNIV PRESS, 2006.
Buscar texto completoRubin, Frank. Secret Key Cryptography: Ciphers, from Simple to Unbreakable. Manning Publications Co. LLC, 2022.
Buscar texto completoSecret Key Cryptography: Ciphers, from Simple to Unbreakable. Manning Publications Co. LLC, 2022.
Buscar texto completoCapítulos de libros sobre el tema "Secret-key cryptography"
Buchanan, William J. "Secret Key Encryption." In Cryptography. River Publishers, 2022. http://dx.doi.org/10.1201/9781003337751-3.
Texto completoYan, Song Y. "Secret-Key Cryptography." In Cybercryptography: Applicable Cryptography for Cyberspace Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72536-9_4.
Texto completoHoepman, Jaap-Henk. "Secret Key Authentication with Software-Only Verification." In Financial Cryptography. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45472-1_21.
Texto completoTilburg, Johan. "Secret-key exchange with authentication." In Computer Security and Industrial Cryptography. Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/3-540-57341-0_56.
Texto completoFafoutis, Xenofon, and Letizia Marchegiani. "Secret Key Generation in Sensor Networks." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-642-27739-9_1796-1.
Texto completoFafoutis, Xenofon, and Letizia Marchegiani. "Secret Key Generation in Sensor Networks." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_1796.
Texto completoJost, Daniel, Ueli Maurer, and João L. Ribeiro. "Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio." In Theory of Cryptography. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03807-6_13.
Texto completoJarecki, Stanisław, and Xiaomin Liu. "Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-72738-5_18.
Texto completoCook, Debra L., John Ioannidis, Angelos D. Keromytis, and Jake Luck. "CryptoGraphics: Secret Key Cryptography Using Graphics Cards." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30574-3_23.
Texto completoCachin, Christian. "Multi-Party Threshold Cryptography." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_13.
Texto completoActas de conferencias sobre el tema "Secret-key cryptography"
"MOBILE SECRET KEY DISTRIBUTION WITH NETWORK CODING." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2007. http://dx.doi.org/10.5220/0002126801710174.
Texto completo"CERTIFIED PSEUDONYMS COLLIGATED WITH MASTER SECRET KEY." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2009. http://dx.doi.org/10.5220/0002226501900197.
Texto completoDey, Jayashree, and Ratna Dutta. "Code-based Key Encapsulation Mechanism Preserving Short Ciphertext and Secret Key." In 19th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2022. http://dx.doi.org/10.5220/0011273900003283.
Texto completo"A Novel Fuzzy Vault Scheme for Secret Key Exchange." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2012. http://dx.doi.org/10.5220/0004125404260429.
Texto completoGazi, Peter, and Stefano Tessaro. "Secret-key cryptography from ideal primitives: A systematic overview." In 2015 IEEE Information Theory Workshop (ITW). IEEE, 2015. http://dx.doi.org/10.1109/itw.2015.7133163.
Texto completoThiruppathy Kesavan, V., and S. Radhakrishnan. "Secret Key Cryptography based Security Approach for Wireless Sensor Networks." In 2012 International Conference on Recent Advances in Computing and Software Systems (RACSS). IEEE, 2012. http://dx.doi.org/10.1109/racss.2012.6212721.
Texto completoAllam, Ahmed M., Hazem M. Abbas, and M. Watheq El-Kharashi. "Authenticated key exchange protocol using neural cryptography with secret boundaries." In 2013 International Joint Conference on Neural Networks (IJCNN 2013 - Dallas). IEEE, 2013. http://dx.doi.org/10.1109/ijcnn.2013.6707125.
Texto completoGriotti, Mattia, Filippo Gandino, and Maurizio Rebaudengo. "Mixed public and secret-key cryptography for wireless sensor networks." In 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU). IEEE, 2017. http://dx.doi.org/10.23919/icmu.2017.8330094.
Texto completoGibson, F., A. Hening, M. Bourennane, et al. "Investigations on Long Wavelength Quantum Cryptography Systems." In The European Conference on Lasers and Electro-Optics. Optica Publishing Group, 1998. http://dx.doi.org/10.1364/cleo_europe.1998.cthh104.
Texto completoLiu, Shuiyin, Yi Hong, and Emanuele Viterbo. "Unshared secret key cryptography: Achieving Shannon's ideal secrecy and perfect secrecy." In 2014 IEEE Information Theory Workshop (ITW). IEEE, 2014. http://dx.doi.org/10.1109/itw.2014.6970909.
Texto completo