Letteratura scientifica selezionata sul tema "Cryptography"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Cryptography".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Articoli di riviste sul tema "Cryptography"

1

Yan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)." Journal of Physics: Conference Series 2386, no. 1 (2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.

Testo completo
Abstract (sommario):
Abstract Elliptic Curve Cryptography (ECC) is one of the strongest and most efficient cryptographic techniques in modern cryptography. This paper gives the following introduction: The introduction of cryptography’s development; the introduction of the elliptic curve; the principle of ECC; the horizontal comparison between ECC and other types of cryptography; the modern breakthrough of ECC; the applications of ECC; by using a method of literature review. The study’s findings indicate that this factor is responsible for the rapid historical development of cryptography, from the classical passwor
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Goldreich, Oded. "Cryptography and cryptographic protocols." Distributed Computing 16, no. 2-3 (2003): 177–99. http://dx.doi.org/10.1007/s00446-002-0077-1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Adeyemi Afolayan Adesola, Awele Mary-rose Ilusanmi, and Peter Chimee. "A review of the cryptographic approaches to data security: The impact of quantum computing, evolving challenges and future solutions." World Journal of Advanced Research and Reviews 25, no. 2 (2025): 1916–24. https://doi.org/10.30574/wjarr.2025.25.2.0434.

Testo completo
Abstract (sommario):
Cryptography plays a fundamental role in defending digital data against cyberthreats and emerging quantum computer capabilities. This review discusses core cryptographic techniques such as symmetric encryption, asymmetric encryption and cryptographic hashing, as well as advanced techniques like lattice-based cryptography , code-based cryptography, multi-variate polynomial cryptography and hash-based cryptography that are quantum resistant. The review share insight into the applications of cryptographic techniques in securing communications, encrypting databases, blockchain technology, and heal
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Anilkumar, Chunduru, Bhavani Gorle, and Kinthali Sowmya. "A Secure Method of Communication in Conventional Cryptography using Quantum Key Distribution." Applied and Computational Engineering 8, no. 1 (2023): 68–73. http://dx.doi.org/10.54254/2755-2721/8/20230083.

Testo completo
Abstract (sommario):
Security knowledge is one of the foremost challenges in the present day. When the topic is about Information security, the concept of cryptography comes into the picture. Every day, people and organizations use cryptography to maintain the confidentiality of their communications and data as well as to preserve their privacy. Today, one of the most successful methods used by businesses to protect their storage systems, whether at rest or in transit, is cryptography. Yet, cryptography is an effective technique to secure the data, the modern technology can break the cryptographic techniques. But
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Donia Fadil Chalob, Rusul Hussein Hasan, and Suaad M. Saber. "A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis." International Journal of Scientific Research in Science, Engineering and Technology 12, no. 1 (2025): 275–82. https://doi.org/10.32628/ijsrset25121171.

Testo completo
Abstract (sommario):
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Pasupuleti, Murali Krishna. "Post-Quantum Cryptography: Algorithms and Implementation Challenges." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 06 (2025): 234–43. https://doi.org/10.62311/nesx/rphcrcscrbc4.

Testo completo
Abstract (sommario):
The advent of quantum computing presents a significant threat to classical public-key cryptographic systems, including RSA and Elliptic Curve Cryptography (ECC), thereby accelerating the development and standardization of post-quantum cryptography (PQC). This study evaluates the performance and implementation challenges of leading PQC algorithms across three major categories: lattice-based, hash-based, and multivariate cryptographic schemes. Utilizing empirical benchmark data from NIST candidate algorithms, the analysis focuses on key generation time, encryption latency, and memory consumption
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Bhoomika, P. Shetty, S. Darshan, B. R. Drakshayanamma, and Abdulhayan Sayed. "Review on Quantum Key Distribution." Journal of Optical Communication Electronics 5, no. 2 (2019): 1–4. https://doi.org/10.5281/zenodo.2656087.

Testo completo
Abstract (sommario):
<em>There have been tremendous developments in the field of cryptography. Quantum computers is one among them. Solving complex mathematical calculations are made easy using quantum computers. Introducing quantum physics into cryptography led to growth of quantum cryptography. Quantum cryptography is a technique of using photons to generate a cryptographic key and transmit it to a receiver using a suitable communication channel. Quantum cryptography uses quantum mechanical principles such as Heisenberg Uncertainty principle and photon polarisation principle to perform cryptographic tasks toward
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Wei, Yuchong. "A Survey of Lattice Cryptography." Applied and Computational Engineering 135, no. 1 (2025): 210–16. https://doi.org/10.54254/2755-2721/2025.21190.

Testo completo
Abstract (sommario):
Lattice cryptography has become one of the focal points in the era of quantum computing development. RSA and ECC, traditional public key cryptosystems, may become insecure in the face of quantum computers. In contrast, lattice cryptography is considered a potential solution for cryptographic security in the quantum computing age due to its inherent mathematical problems that require the use of quantum computers to solve. Moreover, lattice cryptographic algorithms can achieve efficient encryption and decryption processes and support a variety of cryptographic constructions, including encryption
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Pasupuleti, Murali Krishna. "Algebraic Geometry Methods in Cryptographic Protocol Design." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 04 (2025): 296–304. https://doi.org/10.62311/nesx/rp2525.

Testo completo
Abstract (sommario):
Abstract: Algebraic geometry offers a powerful and elegant mathematical framework for the design and analysis of modern cryptographic protocols. This research paper investigates the application of algebraic geometry methods—such as elliptic curves, abelian varieties, and projective algebraic structures—in enhancing the security, efficiency, and scalability of cryptographic systems. By bridging advanced algebraic structures with cryptographic primitives, the study demonstrates how algebraic geometry enables the construction of secure public key protocols, zero-knowledge proofs, and post-quantum
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Rusetskaya, Irina A. "CRYPTOGRAPHY. FROM THE PAST TO THE FUTURE." RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, no. 4 (2021): 47–57. http://dx.doi.org/10.28995/2686-679x-2021-4-47-57.

Testo completo
Abstract (sommario):
The article is devoted to the analysis of modern trends in the development of cryptography, which are related to the issues of cryptography of the past and are reflected in the prospects for the development of cryptography in the future. New trends in the development of cryptography that are relevant in recent decades are highlighted, the main ones of which include: awareness of the mathematical nature of data encryption problems, the rapid increase in the volume of processed and encrypted information that is distributed among a large unlimited circle of users of the modern data transmission d
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Tesi sul tema "Cryptography"

1

Poschmann, Axel York. "Lightweight cryptography cryptographic engineering for a pervasive world." Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2009. http://d-nb.info/996578153/04.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Almeida, Braga Daniel de. "Cryptography in the wild : the security of cryptographic implementations." Thesis, Rennes 1, 2022. http://www.theses.fr/2022REN1S067.

Testo completo
Abstract (sommario):
Les attaques par canaux auxiliaire sont redoutables face aux implémentations cryptographiques. Malgré les attaques passées, et la prolifération d'outils de vérification, ces attaques affectent encore de nombreuses implémentations. Dans ce manuscrit, nous abordons deux aspects de cette problématique, centrés autour de l'attaque et de la défense. Nous avons dévoilé plusieurs attaques par canaux auxiliaires microarchitecturaux sur des implémentations de protocoles PAKE. En particulier, nous avons exposé des attaques sur Dragonfly, utilisé dans la nouvelle norme Wi-Fi WPA3, et SRP, déployé dans de
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Yerushalmi, Yoav. "Incremental cryptography." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42789.

Testo completo
Abstract (sommario):
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1997.<br>Includes bibliographical references (leaves 147-148).<br>by Yoav Yerushalmi.<br>M.Eng.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Shamonin, K. E. "Quantum cryptography." Thesis, Sumy State University, 2018. http://essuir.sumdu.edu.ua/handle/123456789/66837.

Testo completo
Abstract (sommario):
To advance most popular encryption algorithms such as public-key encryption and signature-based schemes, methods of quantum cryptography can be used. The main advantage of quantum cryptography is the fact it cannot be broken by any non-quantum computers and eavesdropping is impossible in quantum key distribution. Fundamental quantum mechanics is used in quantum key distribution to guarantee the safety of data transmitted. It is based on entangled pairs of photons in E91 protocol or photon polarization states in BB84 protocol.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Lopez, Samuel. "MODERN CRYPTOGRAPHY." CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/729.

Testo completo
Abstract (sommario):
We live in an age where we willingly provide our social security number, credit card information, home address and countless other sensitive information over the Internet. Whether you are buying a phone case from Amazon, sending in an on-line job application, or logging into your on-line bank account, you trust that the sensitive data you enter is secure. As our technology and computing power become more sophisticated, so do the tools used by potential hackers to our information. In this paper, the underlying mathematics within ciphers will be looked at to understand the security of modern cip
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Minaud, Brice. "Analyse de primitives cryptographiques récentes." Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1S066/document.

Testo completo
Abstract (sommario):
Dans cette thèse, nous nous intéressons à la sécurité de quelques primitives cryptographiques récentes, d’abord symétriques puis asymétriques, en passant par le modèle en boîte blanche, qui est à certains égards intermédiaire. Dans un premier temps, nous montrons l’existence de fonctions linéaires non triviales commutant avec la fonction de tour de certains chiffrements par bloc, dont découlent des attaques par auto-similarité et sous-espace invariant. Nous nous intéressons ensuite à la cryptanalyse de la structure ASASA, où deux couches non linéaires S sont imbriquées dans des couches affines
Gli stili APA, Harvard, Vancouver, ISO e altri
7

PRIYADHARSHINI, THIRUTHUVADOSS ANGELINE. "Comparison and Performance Evaluation of Modern Cryptography and DNA Cryptography." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-120103.

Testo completo
Abstract (sommario):
In this paper, a new cryptographic method called DNA cryptography and the already existing methods of modern cryptography are studied, implemented and results are obtained. Both these cryptographic method’s results are compared and analyzed to find out the better approach among the two methods. The comparison is done in the main aspects of process running time, key size, computational complexity and cryptographic strength. And the analysis is made to find the ways these above mentioned parameters are enhancing the respective cryptographic methods and the performance is evaluated. For compariso
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Nyman, Ellinor. "Cryptography : A study of modern cryptography and its mathematical methods." Thesis, Uppsala universitet, Analys och sannolikhetsteori, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-447460.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Idrees, Zunera. "Elliptic Curves Cryptography." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17544.

Testo completo
Abstract (sommario):
In the thesis we study the elliptic curves and its use in cryptography. Elliptic curvesencompasses a vast area of mathematics. Elliptic curves have basics in group theory andnumber theory. The points on elliptic curve forms a group under the operation of addition.We study the structure of this group. We describe Hasse’s theorem to estimate the numberof points on the curve. We also discuss that the elliptic curve group may or may not becyclic over finite fields. Elliptic curves have applications in cryptography, we describe theapplication of elliptic curves for discrete logarithm problem and El
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Roe, Michael Robert. "Cryptography and evidence." Thesis, University of Cambridge, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.627396.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Libri sul tema "Cryptography"

1

Stinson, Douglas R., and Maura B. Paterson. Cryptography. Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9781315282497.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Rubinstein-Salzedo, Simon. Cryptography. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94818-8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Slayton, Rebecca, ed. Democratizing Cryptography. ACM, 2022. http://dx.doi.org/10.1145/3549993.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Franklin, Matthew, ed. Financial Cryptography. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48390-x.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Omondi, Amos R. Cryptography Arithmetic. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-34142-8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Easttom, William. Modern Cryptography. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63115-4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Hirschfeld, Rafael, ed. Financial Cryptography. Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-63594-7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Hirchfeld, Rafael, ed. Financial Cryptography. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0055468.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Ferguson, Niels, Bruce Schneier, and Tadayoshi Kohno. Cryptography Engineering. Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781118722367.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Blaze, Matt, ed. Financial Cryptography. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36504-4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Capitoli di libri sul tema "Cryptography"

1

Hofheinz, Dennis, and Eike Kiltz. "Scalable Cryptography." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-21534-6_9.

Testo completo
Abstract (sommario):
AbstractIn our modern digital society, cryptography is vital to protect the secrecy and integrity of transmitted and stored information. Settings like digital commerce, electronic banking, or simply private email communication already rely on encryption and signature schemes.However, today’s cryptographic schemes do not scale well, and thus are not suited for the increasingly large sets of data they are used on. For instance, the security guarantees currently known for RSA encryption—one of the most commonly used type of public-key encryption scheme—degrade linearly in the number of users and
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Buchmann, Johannes. "Sustainable Cryptography." In International Symposium on Mathematics, Quantum Theory, and Cryptography. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5191-8_1.

Testo completo
Abstract (sommario):
Abstract Cryptography is a fundamental tool for cybersecurity and privacy which must be protected for long periods of time. However, the security of most cryptographic algorithms relies on complexity assumptions that may become invalid over time. In this talk I discuss how sustainable cybersecurity and privacy can be achieved in this situation.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Hardy, Yorick, and Willi-Hans Steeb. "Cryptography." In Classical and Quantum Computing. Birkhäuser Basel, 2001. http://dx.doi.org/10.1007/978-3-0348-8366-5_11.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Wallis, W. D. "Cryptography." In Mathematics in the Real World. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-8529-2_11.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

O’Regan, Gerard. "Cryptography." In Texts in Computer Science. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44561-8_10.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Koblitz, Neal. "Cryptography." In Mathematics Unlimited — 2001 and Beyond. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/978-3-642-56478-9_38.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Kizza, Joseph Migga. "Cryptography." In Guide to Computer Network Security. Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_11.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Corsini, Piergiulio, and Violeta Leoreanu. "Cryptography." In Applications of Hyperstructure Theory. Springer US, 2003. http://dx.doi.org/10.1007/978-1-4757-3714-1_8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Hansmann, Uwe, Martin S. Nicklous, Thomas Schäck, and Frank Seliger. "Cryptography." In Smart Card Application Development Using Java. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-642-98052-7_4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Norberg, Scott. "Cryptography." In Advanced ASP.NET Core 3 Security. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6014-2_3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Atti di convegni sul tema "Cryptography"

1

Singh, Pankaj, Ashutosh Srivastava, Divya Srivastava, Shivam, Madhushi Verma, and Vaishnavi Srivastava. "An Overview of Quantum Cryptography Evolution From Classical Cryptography." In 2025 International Conference on Cognitive Computing in Engineering, Communications, Sciences and Biomedical Health Informatics (IC3ECSBHI). IEEE, 2025. https://doi.org/10.1109/ic3ecsbhi63591.2025.10990566.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Seeburrun, Koshik, Karel Veerabudren, Mrinal Sharma, and Girish Bekaroo. "Demystifying Cryptography: An Experimental Study of Classical and Quantum Cryptography." In 2024 5th International Conference on Emerging Trends in Electrical, Electronic and Communications Engineering (ELECOM). IEEE, 2024. https://doi.org/10.1109/elecom63163.2024.10892169.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Ishaq, Muhammad, and Bushra Al-Anesi. "Quantum Cryptography and Post-Quantum Security: Safeguarding Cryptographic Protocols Against Quantum Threats." In 2025 2nd International Conference on Advanced Innovations in Smart Cities (ICAISC). IEEE, 2025. https://doi.org/10.1109/icaisc64594.2025.10959635.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Jovanović, Boriša, Ivan Tot, and Silvana Ilić. "Contemporary cryptography: Recent achievement and research perspectives." In 11th International Scientific Conference on Defensive Technologies - OTEX 2024. Military Technical Institute, Belgrade, 2024. http://dx.doi.org/10.5937/oteh24067j.

Testo completo
Abstract (sommario):
In modern times, cryptography has been considered as a branch of both mathematics and computer science, and is tightly related to information security. With the accelerated progress of the Internet and the increase of digital communication, the need for stronger and more effective methods of cryptographic protection has become more pronounced. With the rapid increase in computing power, the potential for breaking cryptographic algorithms also increases. This fact in modern cryptography creates a need for stronger and more advanced cryptographic algorithms. One development direction of modern c
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Slutsky, Boris A., R. Rao, L. Tancevski, P. C. Sun, and Y. Fainman. "Information Leakage Estimates in Quantum Cryptography." In Optics in Computing. Optica Publishing Group, 1997. http://dx.doi.org/10.1364/oc.1997.owc.2.

Testo completo
Abstract (sommario):
Quantum cryptography permits two parties, who share no secret information initially, to communicate over an open channel and establish between themselves a shared secret sequence of bits [1]. Quantum cryptography is provably secure against an eavesdropping attack because any attempt by a third party to monitor a quantum cryptographic channel reveals itself through transmission errors between the legitimate users.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Faz-Hernández, Armando, and Julio López. "High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves." In Concurso de Teses e Dissertações. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/ctd.2023.230156.

Testo completo
Abstract (sommario):
Cryptography based on elliptic curves is endowed with efficient methods for public-key cryptography. Recent research has shown the superiority of the Montgomery and Edwards curves over the Weierstrass curves as they require fewer arithmetic operations. Using these modern curves has, however, introduced several challenges to the cryptographic algorithm’s design, opening up new opportunities for optimization. Our main objective is to propose algorithmic optimizations and implementation techniques for cryptographic algorithms based on elliptic curves. In order to speed up the execution of these a
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Faz-Hernandez, Armando, and Julio López. "High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2024. http://dx.doi.org/10.5753/sbseg_estendido.2024.241959.

Testo completo
Abstract (sommario):
Cryptography based on elliptic curves is endowed with efficient methods for public-key cryptography. Recent research has shown the superiority of the Montgomery and Edwards curves over the Weierstrass curves as they require fewer arithmetic operations. Using these modern curves has, however, introduced several challenges to the cryptographic algorithm’s design, opening up new opportunities for optimization. Our main objective is to propose algorithmic optimizations and implementation techniques for cryptographic algorithms based on elliptic curves. In order to speed up the execution of these a
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Duta, Cristinaloredana, and Laura Gheorghe. "ELEARNING FRAMEWORK FOR UNDERSTANDING CRYPTOGRAPHY AT ALL LEVELS." In eLSE 2015. Carol I National Defence University Publishing House, 2015. http://dx.doi.org/10.12753/2066-026x-15-026.

Testo completo
Abstract (sommario):
Nowadays security is needed in order to transmit confidential information over the network, which means that is required in everyday life of humanity. The best way to ensure data confidentiality is by using cryptography, which is considered an essential component in many modern applications. In this context, it is important for developers to understand how to efficiently and correctly implement security mechanisms and also how to apply them properly. In this paper, we present an eLearning platform for teachers, students, developers and other users interested in cryptography. The application al
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Лацин, Семен Михайлович, and Наталья Александровна Борсук. "ANALYSIS OF ELLIPTICAL CRYPTOGRAPHY ON THE EXAMPLE OF THE BITCOIN BLOCKCHAIN." In Методики фундаментальных и прикладных научных исследований: сборник статей всероссийской научной конференции (Санкт-Петербург, Декабрь 2022). Crossref, 2023. http://dx.doi.org/10.37539/221223.2022.83.11.008.

Testo completo
Abstract (sommario):
Криптография на основе эллиптических кривых была недавней областью исследований в криптографии. Она обеспечивает более высокий уровень безопасности с меньшим размером ключа по сравнению с другими методами шифрования. В статье рассмотрен принцип работы эллиптической криптографии. Elliptic curve cryptography has been a recent research area in the field of cryptography. It provides higher level of security with lesser key size compared to other cryptographic techniques. The article considers the principle of operation of elliptic curve cryptography.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

AXENTI, Ilie, and Olga CERBU. "Criptografia vizuală." In Materialele Conferinţei Ştiinţifice Internaţionale "Abordări inter/transdisciplinare în predarea ştiinţelor reale, (concept STEAM)". Ion Creangă Pedagogical State University, 2024. https://doi.org/10.46727/c.steam-2024.p249-253.

Testo completo
Abstract (sommario):
Visual Cryptography (VC) is a cryptographic methodology that enables the encryption of visual information, such as text, images, etc., so that decryption can be performed by the human visual system without the assistance of computers. The purpose of this study is to provide readers with an overview of the first method of visual cryptography, along with various methods developed and proposed over time. This paper also offers a study of applications based on the concept of Visual Cryptography.
Gli stili APA, Harvard, Vancouver, ISO e altri

Rapporti di organizzazioni sul tema "Cryptography"

1

Sonmez Turan, Meltem. Ascon-Based Lightweight Cryptography Standards for Constrained Devices. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.sp.800-232.

Testo completo
Abstract (sommario):
In 2023, the National Institute of Standards and Technology (NIST) announced the selection of the Ascon family of algorithms designed by Dobraunig, Eichlseder, Mendel, and Schläffer to provide efficient cryptographic solutions for resource-constrained devices. This decision emerged from a rigorous, multi-round lightweight cryptography standardization process. The Ascon family includes a suite of cryptographic primitives that provide Authenticated Encryption with Associated Data (AEAD), hash function, and eXtendable Output Function (XOF) capabilities. The Ascon family is characterized by lightw
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Nechvatal, James. Public-key cryptography. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.sp.800-2.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

de Abreu, Jonas, and Mariana Cunha e Melo. Extending Pix: An approach to offline Dynamic QR Code generation. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/9qu6ex.

Testo completo
Abstract (sommario):
The Pix Dynamic QR Code URI can be extended to allow for offline QR Code generation. The proposed solution involves generating URIs that can be used as a vehicle to transmit information from the client to the server, allowing the payee to generate their own URIs. The document also goes into detail about URI properties, encoding, and cryptography. The proposed design balances tradeoffs between the amount of data that can be transmitted and cryptographic guarantees, and uses commonly available cryptographic primitives to reduce implementation costs.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Jonsson, J., and B. Kaliski. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3447.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Mouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8319.

Testo completo
Abstract (sommario):
The field of cryptography continues to advance at a very rapid pace, leading to new insights that may impact the security properties of cryptographic algorithms. The Crypto Publication Review Board ("the Board") has been established to identify publications to be reviewed. This report subjects the first standard to the review process: Federal Information Processing Standard (FIPS) 197, which defines the Advanced Encryption Standard (AES).
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.

Testo completo
Abstract (sommario):
Abstract: As quantum computing and quantum communication technologies advance, securing quantum networks against emerging cyber threats has become a critical challenge. Traditional cryptographic methods are vulnerable to quantum attacks, necessitating the development of AI-driven security solutions. This research explores the integration of machine learning (ML) algorithms with quantum cryptographic frameworks to enhance Quantum Key Distribution (QKD), post-quantum cryptography (PQC), and real-time threat detection. AI-powered quantum security mechanisms, including neural network-based quantum
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Blake-Wilson, S., D. Brown, and P. Lambert. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3278.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Turner, S., and D. Brown. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5753.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Draelos, Timothy John, Mark Dolan Torgerson, William Douglas Neumann, Donald R. Gallup, Michael Joseph Collins, and Cheryl Lynn Beaver. Hybrid cryptography key management. Office of Scientific and Technical Information (OSTI), 2003. http://dx.doi.org/10.2172/918318.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

McKay, Kerry A., Larry Bassham, Meltem Sonmez Turan, and Nicky Mouha. Report on lightweight cryptography. National Institute of Standards and Technology, 2017. http://dx.doi.org/10.6028/nist.ir.8114.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!