Articoli di riviste sul tema "CRYPTOGRAPHI"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "CRYPTOGRAPHI".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
WANG, XINGYUAN, MING LIU e NINI GU. "TWO NEW CHAOTIC CRYPTOGRAPHIES BASED ON DIFFERENT ATTRACTOR-PARTITION ALGORITHMS". International Journal of Modern Physics B 21, n. 27 (30 ottobre 2007): 4739–50. http://dx.doi.org/10.1142/s0217979207038071.
Testo completoYan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)". Journal of Physics: Conference Series 2386, n. 1 (1 dicembre 2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Testo completoGoldreich, Oded. "Cryptography and cryptographic protocols". Distributed Computing 16, n. 2-3 (1 settembre 2003): 177–99. http://dx.doi.org/10.1007/s00446-002-0077-1.
Testo completoBAFTIU, Naim. "Analysis and use of Cryptography techniques in programming language C#: Coding and Decoding". PRIZREN SOCIAL SCIENCE JOURNAL 4, n. 3 (31 dicembre 2020): 1–10. http://dx.doi.org/10.32936/pssj.v4i3.165.
Testo completo., Abhishek Misal, e Tin Mar Kyi . "Virtual Cryptopgraphic Technique and Bit-plane Segmentation Stegnegography for Security in Bioinformatics and Biomedical Applications". CSVTU International Journal of Biotechnology Bioinformatics and Biomedical 4, n. 2 (3 settembre 2019): 59–66. http://dx.doi.org/10.30732/ijbbb.20190402005.
Testo completoAnilkumar, Chunduru, Bhavani Gorle e Kinthali Sowmya. "A Secure Method of Communication in Conventional Cryptography using Quantum Key Distribution". Applied and Computational Engineering 8, n. 1 (1 agosto 2023): 68–73. http://dx.doi.org/10.54254/2755-2721/8/20230083.
Testo completoPaul, Sebastian, e Melanie Niethammer. "On the importance of cryptographic agility for industrial automation". at - Automatisierungstechnik 67, n. 5 (27 maggio 2019): 402–16. http://dx.doi.org/10.1515/auto-2019-0019.
Testo completoVictor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat e Abdullayeva Shakhzoda. "Cryptography: Advances in Secure Communication and Data Protection". E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.
Testo completoRusetskaya, Irina A. "CRYPTOGRAPHY. FROM THE PAST TO THE FUTURE". RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, n. 4 (2021): 47–57. http://dx.doi.org/10.28995/2686-679x-2021-4-47-57.
Testo completoSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications". Mathematical Statistician and Engineering Applications 70, n. 1 (31 gennaio 2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Testo completoDarko, Cyprian Danso. "Data Security in the Cloud Using Multi-Modal Bio-Cryptographic Authentication". Advances in Multidisciplinary and scientific Research Journal Publication 10, n. 4 (30 novembre 2022): 9–14. http://dx.doi.org/10.22624/aims/digital/v10n4p2.
Testo completoLiu, Lingfeng, Hongyue Xiang, Renzhi Li e Hanping Hu. "The Eigenvalue Complexity of Sequences in the Real Domain". Entropy 21, n. 12 (5 dicembre 2019): 1194. http://dx.doi.org/10.3390/e21121194.
Testo completoIrawan, Muhammad Dedi. "IMPLEMENTASI KRIPTOGRAFI VIGENERE CIPHER DENGAN PHP". JURNAL TEKNOLOGI INFORMASI 1, n. 1 (1 giugno 2017): 11. http://dx.doi.org/10.36294/jurti.v1i1.21.
Testo completoAkram, Zaryab. "Cryptology Based on Laplace Transform of Hyperbolic Function and Matrix Decomposition Method". ECS Meeting Abstracts MA2022-02, n. 64 (9 ottobre 2022): 2364. http://dx.doi.org/10.1149/ma2022-02642364mtgabs.
Testo completoVanjara, Pratik A., e Dr Kishor Atkotiya. "An Investigation Into the Field of Cryptography and Cryptographic Algorithm Protocols". Paripex - Indian Journal Of Research 2, n. 2 (15 gennaio 2012): 58–60. http://dx.doi.org/10.15373/22501991/feb2013/19.
Testo completoHammad, Baraa Tareq, Ali Maki Sagheer, Ismail Taha Ahmed e Norziana Jamil. "A comparative review on symmetric and asymmetric DNA-based cryptography". Bulletin of Electrical Engineering and Informatics 9, n. 6 (1 dicembre 2020): 2484–91. http://dx.doi.org/10.11591/eei.v9i6.2470.
Testo completoChochtoula, Despoina, Aristidis Ilias, Yannis C. Stamatiou e Christos Makris. "Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol". Future Internet 14, n. 8 (28 luglio 2022): 232. http://dx.doi.org/10.3390/fi14080232.
Testo completoGil Molk, Ali Mohammad Norouzzadeh, Mohammad Reza Aref e Reza Ramazani Khorshiddoust. "Analysis of design goals of cryptography algorithms based on different components". Indonesian Journal of Electrical Engineering and Computer Science 23, n. 1 (1 luglio 2021): 540. http://dx.doi.org/10.11591/ijeecs.v23.i1.pp540-548.
Testo completoHafiz Nanda Ginting, Subhan, Muhammad Rhifky Wayahdi e Surya Guntur. "Playfair Cipher Algorithm in Learning Media". Jurnal Minfo Polgan 11, n. 1 (5 marzo 2022): 9–14. http://dx.doi.org/10.33395/jmp.v11i1.11560.
Testo completoDas, Jyotirmoy, Sangeeta Kakoty e Majidul Ahmed. "A Study on Modern Cryptographic Primitives and Signature Schemes". IRA-International Journal of Technology & Engineering (ISSN 2455-4480) 5, n. 3 (27 dicembre 2016): 70. http://dx.doi.org/10.21013/jte.v5.n3.p3.
Testo completoB S, Aditya, e Sharadadevi Kaganurmath. "Use of Cryptography and Signing for Network Security". International Journal for Research in Applied Science and Engineering Technology 10, n. 7 (31 luglio 2022): 4080–83. http://dx.doi.org/10.22214/ijraset.2022.45926.
Testo completoSabaya, Dinaeli Paul, Adam Aloyce Semlambo e Joel Kazoba Simon. "Data Security Through Crypto-Stegano Systems". International Journal of Computational Science, Information Technology and Control Engineering 10, n. 1/2/3 (27 luglio 2023): 1–23. http://dx.doi.org/10.5121/ijcsitce.2023.10301.
Testo completoEt. al., Mandru Manisha,. "Colour Visual Cryptography (3,3) Scheme". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n. 2 (10 aprile 2021): 3189–98. http://dx.doi.org/10.17762/turcomat.v12i2.2374.
Testo completoDanoyan, D. H. "EXTENDING WHITE-BOX CRYPTOGRAPHY BASED OBLIVIOUS TRANSFER PROTOCOL". Proceedings of the YSU A: Physical and Mathematical Sciences 50, n. 1 (239) (18 marzo 2016): 40–44. http://dx.doi.org/10.46991/psyu:a/2016.50.1.040.
Testo completoZHANG, YU. "The computational SLR: a logic for reasoning about computational indistinguishability". Mathematical Structures in Computer Science 20, n. 5 (ottobre 2010): 951–75. http://dx.doi.org/10.1017/s0960129510000265.
Testo completoIppolitova, Aleksandra. "The Functions of the Cryptography in the Olonets Codex of Incantations of 17th Сentury. 1. Systematization of Data". Slavianovedenie, n. 6 (2022): 38. http://dx.doi.org/10.31857/s0869544x0023260-9.
Testo completoTeja, Penumantra Satya Sai, Mounika Lakshmi P e Vinay Kumar K. "A Secure Communication through Quantum Key Distribution Protocols". International Research Journal of Electronics and Computer Engineering 4, n. 3 (30 settembre 2018): 14. http://dx.doi.org/10.24178/irjece.2018.4.3.14.
Testo completoXiao, Dianyan, e Yang Yu. "Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption". Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/4957045.
Testo completoHulian, A. D., e R. V. Karpenko. "TRANSFER THAT ARE NEEDERS FOR CRYSTOVAL AS INVESTMENT UNION SPECULATIVE ASSET". Actual problems of native jurisprudence, n. 05 (5 dicembre 2019): 60–65. http://dx.doi.org/10.15421/391958.
Testo completoDuka, Mariusz. "ELLIPTIC-CURVE CRYPTOGRAPHY (ECC) AND ARGON2 ALGORITHM IN PHP USING OPENSSL AND SODIUM LIBRARIES". Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 10, n. 3 (30 settembre 2020): 91–94. http://dx.doi.org/10.35784/iapgos.897.
Testo completoMakeri, Yakubu Ajiji. "INTEGRATED CRYPTOGRAPHICAL ACCESS CONTROL OVER NETWORK PROJECT". Acta Informatica Malaysia 4, n. 1 (18 maggio 2020): 19–21. http://dx.doi.org/10.26480/aim.01.2020.19.21.
Testo completoGeetha, M., e K. Akila. "SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS". IJISCS (International Journal of Information System and Computer Science) 2, n. 3 (14 marzo 2019): 123. http://dx.doi.org/10.56327/ijiscs.v2i3.708.
Testo completoKlyucharev, Petr. "CELLULAR AUTOMATA AND THEIR GENERALIZATIONS IN CRYPTOGRAPHY. PART 2." Voprosy kiberbezopasnosti, n. 1(47) (2022): 37–48. http://dx.doi.org/10.21681/2311-3456-2022-1-37-48.
Testo completoAbhishek, Kunal, e E. George Dharma Prakash Raj. "Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography". Cybernetics and Information Technologies 21, n. 2 (1 giugno 2021): 70–88. http://dx.doi.org/10.2478/cait-2021-0020.
Testo completoKaushal, Milind. "Cryptography: A Brief Review". International Journal for Research in Applied Science and Engineering Technology 10, n. 2 (28 febbraio 2022): 763–67. http://dx.doi.org/10.22214/ijraset.2022.40401.
Testo completoNana, Nana, e Puguh Wahyu Prasetyo. "An implementation of Hill cipher and 3x3x3 rubik's cube to enhance communication security". Bulletin of Applied Mathematics and Mathematics Education 1, n. 2 (10 dicembre 2021): 75–92. http://dx.doi.org/10.12928/bamme.v1i2.4252.
Testo completoOkhrimenko, Tetiana, Serhii Dorozhynskyi e Bohdan Horbakha. "ANALYSIS OF QUANTUM SECURE DIRECT COMMUNICATION PROTOCOLS". Computer systems and information technologies, n. 1 (30 marzo 2023): 62–67. http://dx.doi.org/10.31891/csit-2023-1-8.
Testo completoNişancı, Görkem, Paul G. Flikkema e Tolga Yalçın. "Symmetric Cryptography on RISC-V: Performance Evaluation of Standardized Algorithms". Cryptography 6, n. 3 (10 agosto 2022): 41. http://dx.doi.org/10.3390/cryptography6030041.
Testo completoChiou, Shin-Yan. "Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions". BioMed Research International 2013 (2013): 1–12. http://dx.doi.org/10.1155/2013/623815.
Testo completoLada, Nataliia, e Yuliia Rudnytska. "IMPLEMENTATION OF A METHOD FOR SYNTHESIZING GROUPS OF SYMMETRIC DOUBLE-OPERAND OPERATIONS OF CRYPTOGRAPHIC INFORMATION CODING FOR BLOCK ENCRYPTION SYSTEMS". Innovative Technologies and Scientific Solutions for Industries, n. 2 (20) (30 giugno 2022): 35–43. http://dx.doi.org/10.30837/itssi.2022.20.035.
Testo completoKlyucharev, Petr. "Cellular Automata and Their Generalizations in Cryptography. Part 1". Voprosy kiberbezopasnosti, n. 6(46) (2021): 90–101. http://dx.doi.org/10.21681/2311-3456-2021-6-90-101.
Testo completoWang, Xing, Qiang Zhang e Xiao Peng Wei. "A New Encryption Method Based on Rijndael Algorithm and DNA Computing". Applied Mechanics and Materials 20-23 (gennaio 2010): 1241–46. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1241.
Testo completoBarthe, Gilles. "High-Assurance Cryptography: Cryptographic Software We Can Trust". IEEE Security & Privacy 13, n. 5 (settembre 2015): 86–89. http://dx.doi.org/10.1109/msp.2015.112.
Testo completoOctora Ginting, Ferraro S., Veithzal Rivai Zainal e Aziz Hakim. "Digital Signature Standard Implementation Strategy by Optimizing Hash Functions Through Performance Optimization". Journal of Accounting and Finance Management 3, n. 6 (19 febbraio 2023): 362–71. http://dx.doi.org/10.38035/jafm.v3i6.175.
Testo completoKlimushyn, Petro, Tetiana Solianyk, Oleksandr Mozhaev, Vitalii Nosov, Tetiana Kolisnyk e Vasily Yanov. "HARDWARE SUPPORT PROCEDURES FOR ASYMMETRIC AUTHENTICATION OF THE INTERNET OF THINGS". Innovative Technologies and Scientific Solutions for Industries, n. 4 (18) (10 dicembre 2021): 31–39. http://dx.doi.org/10.30837/itssi.2021.18.031.
Testo completoZill, E. Huma, Ul Rahman Jamshaid, Suleman Muhammad e Anjum Naveed. "Cryptographic method based on natural-elzaki transform". i-manager’s Journal on Mathematics 11, n. 1 (2022): 39. http://dx.doi.org/10.26634/jmat.11.1.18511.
Testo completoPriya, R. Shanmuga, e A. Senthilkumar. "A Study on Visual Cryptography for Colour Images". International Journal of Advanced Research in Computer Science and Software Engineering 7, n. 7 (1 agosto 2017): 260. http://dx.doi.org/10.23956/ijarcsse/v7i7/0172.
Testo completoDanger, Jean-Luc, Youssef El Housni, Adrien Facon, Cheikh Gueye, Sylvain Guilley, Sylvie Herbel, Ousmane Ndiaye, Edoardo Persichetti e Alexander Schaub. "On the Performance and Security of Multiplication in GF(2N)". Cryptography 2, n. 3 (18 settembre 2018): 25. http://dx.doi.org/10.3390/cryptography2030025.
Testo completoCambou, Bertrand, Michael Gowanlock, Bahattin Yildiz, Dina Ghanaimiandoab, Kaitlyn Lee, Stefan Nelson, Christopher Philabaum, Alyssa Stenberg e Jordan Wright. "Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions". Applied Sciences 11, n. 6 (21 marzo 2021): 2801. http://dx.doi.org/10.3390/app11062801.
Testo completoBanu, Anees. "Improved Algorithm of Steganography Combined with Cryptography". International Journal for Research in Applied Science and Engineering Technology 9, n. VI (30 giugno 2021): 3793–804. http://dx.doi.org/10.22214/ijraset.2021.35792.
Testo completo