Letteratura scientifica selezionata sul tema "Cryptography"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Cryptography".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Cryptography"
Yan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)." Journal of Physics: Conference Series 2386, no. 1 (December 1, 2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Testo completoGoldreich, Oded. "Cryptography and cryptographic protocols." Distributed Computing 16, no. 2-3 (September 1, 2003): 177–99. http://dx.doi.org/10.1007/s00446-002-0077-1.
Testo completoAdeyemi Afolayan Adesola, Awele Mary-rose Ilusanmi, and Peter Chimee. "A review of the cryptographic approaches to data security: The impact of quantum computing, evolving challenges and future solutions." World Journal of Advanced Research and Reviews 25, no. 2 (February 28, 2025): 1916–24. https://doi.org/10.30574/wjarr.2025.25.2.0434.
Testo completoAnilkumar, Chunduru, Bhavani Gorle, and Kinthali Sowmya. "A Secure Method of Communication in Conventional Cryptography using Quantum Key Distribution." Applied and Computational Engineering 8, no. 1 (August 1, 2023): 68–73. http://dx.doi.org/10.54254/2755-2721/8/20230083.
Testo completoDonia Fadil Chalob, Rusul Hussein Hasan, and Suaad M. Saber. "A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis." International Journal of Scientific Research in Science, Engineering and Technology 12, no. 1 (February 18, 2025): 275–82. https://doi.org/10.32628/ijsrset25121171.
Testo completoBhoomika, P. Shetty, S. Darshan, B. R. Drakshayanamma, and Abdulhayan Sayed. "Review on Quantum Key Distribution." Journal of Optical Communication Electronics 5, no. 2 (May 1, 2019): 1–4. https://doi.org/10.5281/zenodo.2656087.
Testo completoWei, Yuchong. "A Survey of Lattice Cryptography." Applied and Computational Engineering 135, no. 1 (February 27, 2025): 210–16. https://doi.org/10.54254/2755-2721/2025.21190.
Testo completoPasupuleti, Murali Krishna. "Algebraic Geometry Methods in Cryptographic Protocol Design." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 04 (April 21, 2025): 296–304. https://doi.org/10.62311/nesx/rp2525.
Testo completoRusetskaya, Irina A. "CRYPTOGRAPHY. FROM THE PAST TO THE FUTURE." RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, no. 4 (2021): 47–57. http://dx.doi.org/10.28995/2686-679x-2021-4-47-57.
Testo completoGoyal, Rohit. "Quantum Cryptography: Secure Communication Beyond Classical Limits." Journal of Quantum Science and Technology 1, no. 1 (March 31, 2024): 1–5. http://dx.doi.org/10.36676/jqst.v1.i1.01.
Testo completoTesi sul tema "Cryptography"
Poschmann, Axel York. "Lightweight cryptography cryptographic engineering for a pervasive world." Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2009. http://d-nb.info/996578153/04.
Testo completoAlmeida, Braga Daniel de. "Cryptography in the wild : the security of cryptographic implementations." Thesis, Rennes 1, 2022. http://www.theses.fr/2022REN1S067.
Testo completoYerushalmi, Yoav. "Incremental cryptography." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42789.
Testo completoShamonin, K. E. "Quantum cryptography." Thesis, Sumy State University, 2018. http://essuir.sumdu.edu.ua/handle/123456789/66837.
Testo completoLopez, Samuel. "MODERN CRYPTOGRAPHY." CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/729.
Testo completoMinaud, Brice. "Analyse de primitives cryptographiques récentes." Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1S066/document.
Testo completoPRIYADHARSHINI, THIRUTHUVADOSS ANGELINE. "Comparison and Performance Evaluation of Modern Cryptography and DNA Cryptography." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-120103.
Testo completoNyman, Ellinor. "Cryptography : A study of modern cryptography and its mathematical methods." Thesis, Uppsala universitet, Analys och sannolikhetsteori, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-447460.
Testo completoIdrees, Zunera. "Elliptic Curves Cryptography." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17544.
Testo completoRoe, Michael Robert. "Cryptography and evidence." Thesis, University of Cambridge, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.627396.
Testo completoLibri sul tema "Cryptography"
Stinson, Douglas R., and Maura B. Paterson. Cryptography. Fourth edition. | Boca Raton : CRC Press, Taylor & Francis: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9781315282497.
Testo completoRubinstein-Salzedo, Simon. Cryptography. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94818-8.
Testo completoSlayton, Rebecca, ed. Democratizing Cryptography. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3549993.
Testo completoFranklin, Matthew, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48390-x.
Testo completoOmondi, Amos R. Cryptography Arithmetic. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-34142-8.
Testo completoEasttom, William. Modern Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63115-4.
Testo completoHirschfeld, Rafael, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-63594-7.
Testo completoHirchfeld, Rafael, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0055468.
Testo completoFerguson, Niels, Bruce Schneier, and Tadayoshi Kohno. Cryptography Engineering. Indianapolis, Indiana: Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781118722367.
Testo completoBlaze, Matt, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36504-4.
Testo completoCapitoli di libri sul tema "Cryptography"
Hofheinz, Dennis, and Eike Kiltz. "Scalable Cryptography." In Lecture Notes in Computer Science, 169–78. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-21534-6_9.
Testo completoBuchmann, Johannes. "Sustainable Cryptography." In International Symposium on Mathematics, Quantum Theory, and Cryptography, 3. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5191-8_1.
Testo completoHardy, Yorick, and Willi-Hans Steeb. "Cryptography." In Classical and Quantum Computing, 215–28. Basel: Birkhäuser Basel, 2001. http://dx.doi.org/10.1007/978-3-0348-8366-5_11.
Testo completoWallis, W. D. "Cryptography." In Mathematics in the Real World, 157–67. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-8529-2_11.
Testo completoO’Regan, Gerard. "Cryptography." In Texts in Computer Science, 155–70. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44561-8_10.
Testo completoKoblitz, Neal. "Cryptography." In Mathematics Unlimited — 2001 and Beyond, 749–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/978-3-642-56478-9_38.
Testo completoKizza, Joseph Migga. "Cryptography." In Guide to Computer Network Security, 225–48. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_11.
Testo completoCorsini, Piergiulio, and Violeta Leoreanu. "Cryptography." In Applications of Hyperstructure Theory, 247–56. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4757-3714-1_8.
Testo completoHansmann, Uwe, Martin S. Nicklous, Thomas Schäck, and Frank Seliger. "Cryptography." In Smart Card Application Development Using Java, 49–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-642-98052-7_4.
Testo completoNorberg, Scott. "Cryptography." In Advanced ASP.NET Core 3 Security, 57–101. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6014-2_3.
Testo completoAtti di convegni sul tema "Cryptography"
Singh, Pankaj, Ashutosh Srivastava, Divya Srivastava, Shivam, Madhushi Verma, and Vaishnavi Srivastava. "An Overview of Quantum Cryptography Evolution From Classical Cryptography." In 2025 International Conference on Cognitive Computing in Engineering, Communications, Sciences and Biomedical Health Informatics (IC3ECSBHI), 1–6. IEEE, 2025. https://doi.org/10.1109/ic3ecsbhi63591.2025.10990566.
Testo completoSeeburrun, Koshik, Karel Veerabudren, Mrinal Sharma, and Girish Bekaroo. "Demystifying Cryptography: An Experimental Study of Classical and Quantum Cryptography." In 2024 5th International Conference on Emerging Trends in Electrical, Electronic and Communications Engineering (ELECOM), 1–7. IEEE, 2024. https://doi.org/10.1109/elecom63163.2024.10892169.
Testo completoIshaq, Muhammad, and Bushra Al-Anesi. "Quantum Cryptography and Post-Quantum Security: Safeguarding Cryptographic Protocols Against Quantum Threats." In 2025 2nd International Conference on Advanced Innovations in Smart Cities (ICAISC), 1–7. IEEE, 2025. https://doi.org/10.1109/icaisc64594.2025.10959635.
Testo completoJovanović, Boriša, Ivan Tot, and Silvana Ilić. "Contemporary cryptography: Recent achievement and research perspectives." In 11th International Scientific Conference on Defensive Technologies - OTEX 2024, 376–80. Military Technical Institute, Belgrade, 2024. http://dx.doi.org/10.5937/oteh24067j.
Testo completoSlutsky, Boris A., R. Rao, L. Tancevski, P. C. Sun, and Y. Fainman. "Information Leakage Estimates in Quantum Cryptography." In Optics in Computing. Washington, D.C.: Optica Publishing Group, 1997. http://dx.doi.org/10.1364/oc.1997.owc.2.
Testo completoFaz-Hernández, Armando, and Julio López. "High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves." In Concurso de Teses e Dissertações. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/ctd.2023.230156.
Testo completoFaz-Hernandez, Armando, and Julio López. "High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais, 49–56. Sociedade Brasileira de Computação - SBC, 2024. http://dx.doi.org/10.5753/sbseg_estendido.2024.241959.
Testo completoDuta, Cristinaloredana, and Laura Gheorghe. "ELEARNING FRAMEWORK FOR UNDERSTANDING CRYPTOGRAPHY AT ALL LEVELS." In eLSE 2015. Carol I National Defence University Publishing House, 2015. http://dx.doi.org/10.12753/2066-026x-15-026.
Testo completoЛацин, Семен Михайлович, and Наталья Александровна Борсук. "ANALYSIS OF ELLIPTICAL CRYPTOGRAPHY ON THE EXAMPLE OF THE BITCOIN BLOCKCHAIN." In Методики фундаментальных и прикладных научных исследований: сборник статей всероссийской научной конференции (Санкт-Петербург, Декабрь 2022). Crossref, 2023. http://dx.doi.org/10.37539/221223.2022.83.11.008.
Testo completoAXENTI, Ilie, and Olga CERBU. "Criptografia vizuală." In Materialele Conferinţei Ştiinţifice Internaţionale "Abordări inter/transdisciplinare în predarea ştiinţelor reale, (concept STEAM)", 249–53. Ion Creangă Pedagogical State University, 2024. https://doi.org/10.46727/c.steam-2024.p249-253.
Testo completoRapporti di organizzazioni sul tema "Cryptography"
Nechvatal, James. Public-key cryptography. Gaithersburg, MD: National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.sp.800-2.
Testo completode Abreu, Jonas, and Mariana Cunha e Melo. Extending Pix: An approach to offline Dynamic QR Code generation. Center for Technology and Public Interest, SL, April 2023. http://dx.doi.org/10.59262/9qu6ex.
Testo completoJonsson, J., and B. Kaliski. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. RFC Editor, February 2003. http://dx.doi.org/10.17487/rfc3447.
Testo completoMouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, July 2021. http://dx.doi.org/10.6028/nist.ir.8319.
Testo completoPasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, March 2025. https://doi.org/10.62311/nesx/rr925.
Testo completoBlake-Wilson, S., D. Brown, and P. Lambert. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). RFC Editor, April 2002. http://dx.doi.org/10.17487/rfc3278.
Testo completoTurner, S., and D. Brown. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). RFC Editor, January 2010. http://dx.doi.org/10.17487/rfc5753.
Testo completoDraelos, Timothy John, Mark Dolan Torgerson, William Douglas Neumann, Donald R. Gallup, Michael Joseph Collins, and Cheryl Lynn Beaver. Hybrid cryptography key management. Office of Scientific and Technical Information (OSTI), November 2003. http://dx.doi.org/10.2172/918318.
Testo completoMcKay, Kerry A., Larry Bassham, Meltem Sonmez Turan, and Nicky Mouha. Report on lightweight cryptography. Gaithersburg, MD: National Institute of Standards and Technology, March 2017. http://dx.doi.org/10.6028/nist.ir.8114.
Testo completoTorgerson, Mark Dolan, Timothy John Draelos, Richard Crabtree Schroeppel, Russell D. Miller, and William Erik Anderson. Small circuits for cryptography. Office of Scientific and Technical Information (OSTI), October 2005. http://dx.doi.org/10.2172/875977.
Testo completo