Artículos de revistas sobre el tema "Secret-key cryptography"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Secret-key cryptography".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Liu, Shuiyin, Yi Hong, and Emanuele Viterbo. "Unshared Secret Key Cryptography." IEEE Transactions on Wireless Communications 13, no. 12 (2014): 6670–83. http://dx.doi.org/10.1109/twc.2014.2364022.
Texto completoGirija, Rani Suthoju, and Suresh babu M. "Cryptographic Services to Enforce Secure Messaging and Data Storage." International Journal of Innovative Science and Research Technology 7, no. 11 (2022): 1693–96. https://doi.org/10.5281/zenodo.7478875.
Texto completoNAGY, NAYA, MARIUS NAGY, and SELIM G. AKL. "KEY DISTRIBUTION VERSUS KEY ENHANCEMENT IN QUANTUM CRYPTOGRAPHY." Parallel Processing Letters 20, no. 03 (2010): 239–50. http://dx.doi.org/10.1142/s0129626410000193.
Texto completoJoye, Marc, and Sung-Ming Yen. "ID-based secret-key cryptography." ACM SIGOPS Operating Systems Review 32, no. 4 (1998): 33–39. http://dx.doi.org/10.1145/302350.302359.
Texto completoKak, S. C. "Secret-hardware public-key cryptography." IEE Proceedings E Computers and Digital Techniques 133, no. 2 (1986): 94. http://dx.doi.org/10.1049/ip-e.1986.0010.
Texto completoSeptafiansyah, Dwi Putra, Yudhiprawira Mario, Sutikno Sarwono, Kurniawan Yusuf, and Suwandi Ahmad Adang. "Power analysis attack against encryption devices: a comprehensive analysis of AES, DES, and BC3." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 3 (2019): 1282–89. https://doi.org/10.12928/TELKOMNIKA.v17i3.9384.
Texto completoMakeri, Yakubu Ajiji. "INTEGRATED CRYPTOGRAPHICAL ACCESS CONTROL OVER NETWORK PROJECT." Acta Informatica Malaysia 4, no. 1 (2020): 19–21. http://dx.doi.org/10.26480/aim.01.2020.19.21.
Texto completoPallavi, Vijay Chavan, Mohammad Atique Dr., and Latesh Malik Dr. "Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares." International Journal of Network Security & Its Applications (IJNSA) 6, no. 1 (2014): 91–102. https://doi.org/10.5281/zenodo.6471758.
Texto completoSagala, Sarah. "Application of Diffie-Hellman Algorithm Method (Key-Exchange) in Cryptography." Login : Jurnal Teknologi Komputer 18, no. 02 (2024): 114–19. https://doi.org/10.58471/login.v18i02.114.
Texto completoDubey, Praveer, and Ompal Yadav. "A Survey on Quantum cryptography versus classical Cryptography." International Journal of Current Engineering and Technology 10, no. 06 (2021): 910–13. http://dx.doi.org/10.14741/ijcet/v.10.6.3.
Texto completoBachman, Dale J., Ezra A. Brown, and Anderson H. Norton. "Chocolate Key Cryptography." Mathematics Teacher 104, no. 2 (2010): 100–104. http://dx.doi.org/10.5951/mt.104.2.0100.
Texto completoBachman, Dale J., Ezra A. Brown, and Anderson H. Norton. "Chocolate Key Cryptography." Mathematics Teacher 104, no. 2 (2010): 100–104. http://dx.doi.org/10.5951/mt.104.2.0100.
Texto completoAnilkumar, Chunduru, Swathi Lenka, N. Neelima, and Sathishkumar V E. "A Secure Method of Communication Through BB84 Protocol in Quantum Key Distribution." Scalable Computing: Practice and Experience 25, no. 1 (2024): 21–33. http://dx.doi.org/10.12694/scpe.v25i1.2152.
Texto completoDayo Alowolodu, Olufunso, Gabriel K Adelaja, Boniface K Alese, and Olufunke Catherine Olayemi. "Medical Image Security Using Quantum Cryptography." Issues in Informing Science and Information Technology 15 (2018): 057–67. http://dx.doi.org/10.28945/4008.
Texto completoSeredynski, Franciszek, Pascal Bouvry, and Albert Y. Zomaya. "Cellular automata computations and secret key cryptography." Parallel Computing 30, no. 5-6 (2004): 753–66. http://dx.doi.org/10.1016/j.parco.2003.12.014.
Texto completoZhang, Guoyan. "Secret Key-Awareness Secure in Certificateless Cryptography." Procedia Environmental Sciences 10 (2011): 633–39. http://dx.doi.org/10.1016/j.proenv.2011.09.102.
Texto completoI, Arshiya, and Sekar R. "Securing M2m Post-Quantum Secret Key Cryptography." IOSR Journal of Electronics and Communication Engineering 9, no. 1 (2014): 22–27. http://dx.doi.org/10.9790/2834-09132227.
Texto completoMukhammadovich, Nurullaev Mirkhon, and Aloev Rakhmatillo Djuraevich. "Working with cryptographic key information." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (2023): 911. http://dx.doi.org/10.11591/ijece.v13i1.pp911-919.
Texto completoNurullaev, Mirkhon Mukhammadovich, and Rakhmatillo Djuraevich Aloev. "Working with cryptographic key information." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (2023): 911–19. https://doi.org/10.11591/ijece.v13i1.pp911-919.
Texto completoAlqadi, Ziad. "Comparative Analysis of using SIK for Message Cryptography." International Journal of Computer Science and Mobile Computing 12, no. 8 (2023): 45–57. http://dx.doi.org/10.47760/ijcsmc.2023.v12i08.006.
Texto completoCaleg Sadrak Sinaga, Alwi Findo Gultom, Dewi Ruth Nababan, Ari Rivaldo Simanjuntak, and Edi Ginting. "Cryptography With Mceliece Algorithm (Code Based Cryptography)." Jurnal Teknik Indonesia 3, no. 02 (2024): 49–53. https://doi.org/10.58471/ju-ti.v3i02.665.
Texto completoOctora Ginting, Ferraro S., Veithzal Rivai Zainal, and Aziz Hakim. "Digital Signature Standard Implementation Strategy by Optimizing Hash Functions Through Performance Optimization." Journal of Accounting and Finance Management 3, no. 6 (2023): 362–71. http://dx.doi.org/10.38035/jafm.v3i6.175.
Texto completoMinal, Lopes1 and Dr. Nisha Sarwade2. "Cryptography from Quantum Mechanical Viewpoint." International Journal on Cryptography and Information Security (IJCIS) 4, no. 2 (2014): 13. https://doi.org/10.5281/zenodo.7379782.
Texto completoMaram, Balajee, Y. Ramesh Kumar, and K. Lakshmana Rao. "NARSKCA: Novel and robust symmetric key cryptography algorithm." International Journal of Scientific World 3, no. 2 (2015): 244. http://dx.doi.org/10.14419/ijsw.v3i2.5111.
Texto completoTseng, Yuh–Min, Jui-Di Wu, Sen-Shan Huang, and Tung-Tso Tsai. "Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server." Information Technology And Control 49, no. 4 (2020): 464–81. http://dx.doi.org/10.5755/j01.itc.49.4.25927.
Texto completoGeetha, M., and K. Akila. "SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS." IJISCS (International Journal of Information System and Computer Science) 2, no. 3 (2019): 123. http://dx.doi.org/10.56327/ijiscs.v2i3.708.
Texto completoNong Phuong Trang and Luu Hong Dung. "A type of public - key block cipher algorithm." Journal of Military Science and Technology, CSCE7 (December 30, 2023): 50–60. http://dx.doi.org/10.54939/1859-1043.j.mst.csce7.2023.49-59.
Texto completoSubhalaxmi Sabitri Das, Subhalaxmi Sabitri Das, Sachin Jena Sachin Jena, and H. Dipali Singh H.Dipali Singh. "The Role of Cryptography in Cyber Security." International Journal of Engineering and Science Invention 14, no. 5 (2025): 48–54. https://doi.org/10.35629/6734-14054854.
Texto completoKaushik, Bharti, Vikas Malik, and Vinod Saroha. "A Review Paper on Data Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 1986–92. http://dx.doi.org/10.22214/ijraset.2023.50101.
Texto completoNovianti, Chofifah Alfin, Muhammad Khudzaifah, and Mohammad Nafie Jauhari. "Kriptografi Hibrida Cipher Block Chaining (CBC) dan Merkle-Hellman Knapsack untuk Pengamanan Pesan Teks." Jurnal Riset Mahasiswa Matematika 3, no. 1 (2023): 10–25. http://dx.doi.org/10.18860/jrmm.v3i1.22292.
Texto completoMankovskyy, S., and Yu Matiieshyn. "PYTHON MODEL OF SECRET KEY AGREEMENT IN THE GROUP OF ARBITRARY NUMBER OF PARTICIPANTS." Information and communication technologies, electronic engineering 4, no. 1 (2024): 93–101. http://dx.doi.org/10.23939/ictee2024.01.093.
Texto completoNguyen, Thi-Nhung. "Privacy preserving using extended euclidean – algorithm applied to RSA." Tạp chí Khoa học - Trường Đại học Sư phạm Hà Nội 2 1, no. 2 (2023): 53–63. http://dx.doi.org/10.56764/hpu2.jos.2023.1.2.53-63.
Texto completoSasongko, Arif, Hidayat Hidayat, Yusuf Kurniawan, and Sarwono Sutikno. "Architecture for the Secret-Key Bc3 Cryptography Algorithm." ITB Journal of Information and Communication Technology 5, no. 2 (2011): 125–40. http://dx.doi.org/10.5614/itbj.ict.2011.5.2.4.
Texto completoHuang, Jianye, Qiong Huang, and Chunhua Pan. "A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting." International Journal of Foundations of Computer Science 28, no. 06 (2017): 761–80. http://dx.doi.org/10.1142/s0129054117400172.
Texto completoChen, Jingyu, Haitao Deng, Huachang Su, Minghao Yuan, and Yongjun Ren. "Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey." Electronics 13, no. 2 (2024): 287. http://dx.doi.org/10.3390/electronics13020287.
Texto completoThottempudi, Pardhu, Sateesh R., Naveen K., and Mani Raj K. "Implementation of Steganographic Algorithms Based on Exact Histogram Matching and Colour Visual Cryptography." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 2 (2019): 519–22. https://doi.org/10.35940/ijeat.B3006.129219.
Texto completoShankar, K., and P. Eswaran. "RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique." Journal of Circuits, Systems and Computers 25, no. 11 (2016): 1650138. http://dx.doi.org/10.1142/s0218126616501383.
Texto completoAbushgra, Abdulbast A. "Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review." Cryptography 6, no. 1 (2022): 12. http://dx.doi.org/10.3390/cryptography6010012.
Texto completoParuchuri, Vijaya Lakshmi, Dr R. Sridevi, and K. S. SadaSiva Rao. "Image Steganography combined with Cryptography." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 9, no. 1 (2013): 976–84. http://dx.doi.org/10.24297/ijct.v9i1.4160.
Texto completoIncze, Arpad. "Pixel-sieve cryptographic primitives with LSB steganography." Global Journal of Information Technology: Emerging Technologies 7, no. 1 (2017): 14–22. http://dx.doi.org/10.18844/gjit.v7i1.1934.
Texto completoAnirban, Bhowmik, Karforma Sunil, and Dey Joydeep. "Recurrence relation and DNA sequence: A state-of-art technique for secret sharing." International Journal of Reconfigurable and Embedded Systems 10, no. 1 (2021): 65–76. https://doi.org/10.11591/ijres.v10.i1.pp65-76.
Texto completoR, Nesamalar, and Dr Ravikumar K. "Proficient and Safe Token with Secret and Public Keys Sharing Algorithm for Preventing Cryptographic Key Leakage in Wireless Sensor Network." International Journal of Engineering Research in Electronics and Communication Engineering 9, no. 9 (2022): 1–6. http://dx.doi.org/10.36647/ijerece/09.09.a001.
Texto completoWANG, XINGYUAN, CHAOFENG DUAN, and NINI GU. "A NEW CHAOTIC CRYPTOGRAPHY BASED ON ERGODICITY." International Journal of Modern Physics B 22, no. 07 (2008): 901–8. http://dx.doi.org/10.1142/s0217979208038983.
Texto completoInternational, Journal of Computer Science Engineering and Applications (IJCSEA). "A Novel Approach for Concealed Data Sharing and Data Embedding for Secured Communication." International Journal of Computer Science, Engineering and Applications (IJCSEA) 1, no. 1 (2024): 1–10. https://doi.org/10.5281/zenodo.14189740.
Texto completoG. S . Wijesiri, P. A. S. D. Perera,. "Encryption and Decryption Algorithms in Symmetric Key Cryptography Using Graph Theory." Psychology and Education Journal 58, no. 1 (2021): 3420–27. http://dx.doi.org/10.17762/pae.v58i1.1280.
Texto completoAbu, Salim, Tripathi Sachin, and Kumar Tiwari Rajesh. "APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE ACCESS CONTROL IN THE CLOUD." International Journal of Computer Networks & Communications (IJCNC) 11, no. 4 (2019): 121–35. https://doi.org/10.5281/zenodo.3445799.
Texto completoAlqadi, Ziad, Yousif Eltous, and Amjad Al Hindi. "Secure, Image based Private Key for Secret Message Cryptography." International Journal of Computer Applications 183, no. 41 (2021): 1–8. http://dx.doi.org/10.5120/ijca2021921802.
Texto completoKr. Naskar, Prabir, Hari Narayan Khan, Ujjal Roy, Ayan Chaudhuri, and Atal Chaudhuri. "Shared Cryptography with Embedded Session Key for Secret Audio." International Journal of Computer Applications 26, no. 8 (2011): 5–9. http://dx.doi.org/10.5120/3128-4305.
Texto completoSholihat Ruhaedi, Hedy, and Alam Rahmatulloh. "DATA SECURITY SCHEME WITH A COMBINATION OF ADVANCED ENCRYPTION STANDARD (AES) AND RIVEST SHAMIR ALDEMAN (RSA) ALGORITHMS." Antivirus : Jurnal Ilmiah Teknik Informatika 18, no. 2 (2024): 177–90. https://doi.org/10.35457/antivirus.v18i2.3369.
Texto completoAl-Saleh, Salah Mohammed, Hind Alhusban, Shatha Fawaz abd Alrahim Ghazal, Reem S. Khaldi, Saad Musa Ali Khalifah, and Amal Abdelfattah Rabah Alsedawi. "MRBM Reordering for Efficient Secret Message Cryptography." International Journal of Computer Science and Mobile Computing 13, no. 7 (2024): 1–11. http://dx.doi.org/10.47760/ijcsmc.2024.v13i07.001.
Texto completo