Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Cryptography“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Cryptography" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Cryptography"
Yan, Yuhan. „The Overview of Elliptic Curve Cryptography (ECC)“. Journal of Physics: Conference Series 2386, Nr. 1 (01.12.2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Der volle Inhalt der QuelleGoldreich, Oded. „Cryptography and cryptographic protocols“. Distributed Computing 16, Nr. 2-3 (01.09.2003): 177–99. http://dx.doi.org/10.1007/s00446-002-0077-1.
Der volle Inhalt der QuelleAnilkumar, Chunduru, Bhavani Gorle und Kinthali Sowmya. „A Secure Method of Communication in Conventional Cryptography using Quantum Key Distribution“. Applied and Computational Engineering 8, Nr. 1 (01.08.2023): 68–73. http://dx.doi.org/10.54254/2755-2721/8/20230083.
Der volle Inhalt der QuelleRusetskaya, Irina A. „CRYPTOGRAPHY. FROM THE PAST TO THE FUTURE“. RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, Nr. 4 (2021): 47–57. http://dx.doi.org/10.28995/2686-679x-2021-4-47-57.
Der volle Inhalt der QuelleGoyal, Rohit. „Quantum Cryptography: Secure Communication Beyond Classical Limits“. Journal of Quantum Science and Technology 1, Nr. 1 (31.03.2024): 1–5. http://dx.doi.org/10.36676/jqst.v1.i1.01.
Der volle Inhalt der QuelleVictor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat und Abdullayeva Shakhzoda. „Cryptography: Advances in Secure Communication and Data Protection“. E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.
Der volle Inhalt der QuelleAnilkumar, Chunduru, Swathi Lenka, N. Neelima und Sathishkumar V E. „A Secure Method of Communication Through BB84 Protocol in Quantum Key Distribution“. Scalable Computing: Practice and Experience 25, Nr. 1 (04.01.2024): 21–33. http://dx.doi.org/10.12694/scpe.v25i1.2152.
Der volle Inhalt der QuelleWANG, XINGYUAN, MING LIU und NINI GU. „TWO NEW CHAOTIC CRYPTOGRAPHIES BASED ON DIFFERENT ATTRACTOR-PARTITION ALGORITHMS“. International Journal of Modern Physics B 21, Nr. 27 (30.10.2007): 4739–50. http://dx.doi.org/10.1142/s0217979207038071.
Der volle Inhalt der QuelleShashi Raj K. „The Intersection of Algebra and Cryptography: Enhancing Information Security through Mathematical Foundations“. Communications on Applied Nonlinear Analysis 31, Nr. 4s (05.07.2024): 466–89. http://dx.doi.org/10.52783/cana.v31.943.
Der volle Inhalt der QuelleYadav, Sonam. „An Extensive Study on Lattice-Based Cryptography and its Applications for RLWE-Based Problems“. Universal Research Reports 10, Nr. 3 (2023): 104–10. http://dx.doi.org/10.36676/urr.2023-v10i3-014.
Der volle Inhalt der QuelleDissertationen zum Thema "Cryptography"
Poschmann, Axel York. „Lightweight cryptography cryptographic engineering for a pervasive world“. Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2009. http://d-nb.info/996578153/04.
Der volle Inhalt der QuelleAlmeida, Braga Daniel de. „Cryptography in the wild : the security of cryptographic implementations“. Thesis, Rennes 1, 2022. http://www.theses.fr/2022REN1S067.
Der volle Inhalt der QuelleSide-channel attacks are daunting for cryptographic implementations. Despite past attacks, and the proliferation of verification tools, these attacks still affect many implementations. In this manuscript, we address two aspects of this problem, centered around attack and defense. We unveil several microarchitectural side-channel attacks on implementations of PAKE protocols. In particular, we exposed attacks on Dragonfly, used in the new Wi-Fi standard WPA3, and SRP, deployed in many software such as ProtonMail or Apple HomeKit. We also explored the lack of use by developers of tools to detect such attacks. We questioned developers from various cryptographic projects to identify the origin of this lack. From their answers, we issued recommendations. Finally, in order to stop the spiral of attack-patch on Dragonfly implementations, we provide a formally verified implementation of the cryptographic layer of the protocol, whose execution is secret-independent
Yerushalmi, Yoav. „Incremental cryptography“. Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42789.
Der volle Inhalt der QuelleIncludes bibliographical references (leaves 147-148).
by Yoav Yerushalmi.
M.Eng.
Shamonin, K. E. „Quantum cryptography“. Thesis, Sumy State University, 2018. http://essuir.sumdu.edu.ua/handle/123456789/66837.
Der volle Inhalt der QuelleLopez, Samuel. „MODERN CRYPTOGRAPHY“. CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/729.
Der volle Inhalt der QuelleMinaud, Brice. „Analyse de primitives cryptographiques récentes“. Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1S066/document.
Der volle Inhalt der QuelleIn this thesis, we study the security of some recent cryptographic primitives, both symmetric and asymmetric. Along the way we also consider white-box primitives, which may be regarded as a middle ground between symmetric and asymmetric cryptography. We begin by showing the existence of non-trivial linear maps commuting with the round function of some recent block cipher designs, which give rise to self-similarity and invariant subspace attacks. We then move on to the structural cryptanalysis of ASASA schemes, where nonlinear layers S alternate with affine layers A. Our structural cryptanalysis applies to symmetric, multivariate, as well as white-box instances. Focusing on the white-box model of incompressibility, we then build an efficient block cipher and key generator that offer provable security guarantees. Finally, on the purely asymmetric side, we describe a polynomial attack against a recent multilinear map proposal
PRIYADHARSHINI, THIRUTHUVADOSS ANGELINE. „Comparison and Performance Evaluation of Modern Cryptography and DNA Cryptography“. Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-120103.
Der volle Inhalt der QuelleNyman, Ellinor. „Cryptography : A study of modern cryptography and its mathematical methods“. Thesis, Uppsala universitet, Analys och sannolikhetsteori, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-447460.
Der volle Inhalt der QuelleIdrees, Zunera. „Elliptic Curves Cryptography“. Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17544.
Der volle Inhalt der QuelleRoe, Michael Robert. „Cryptography and evidence“. Thesis, University of Cambridge, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.627396.
Der volle Inhalt der QuelleBücher zum Thema "Cryptography"
Stinson, Douglas R., und Maura B. Paterson. Cryptography. Fourth edition. | Boca Raton : CRC Press, Taylor & Francis: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9781315282497.
Der volle Inhalt der QuelleRubinstein-Salzedo, Simon. Cryptography. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94818-8.
Der volle Inhalt der QuelleSlayton, Rebecca, Hrsg. Democratizing Cryptography. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3549993.
Der volle Inhalt der QuelleFranklin, Matthew, Hrsg. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48390-x.
Der volle Inhalt der QuelleOmondi, Amos R. Cryptography Arithmetic. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-34142-8.
Der volle Inhalt der QuelleEasttom, William. Modern Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63115-4.
Der volle Inhalt der QuelleHirschfeld, Rafael, Hrsg. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-63594-7.
Der volle Inhalt der QuelleHirchfeld, Rafael, Hrsg. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0055468.
Der volle Inhalt der QuelleFerguson, Niels, Bruce Schneier und Tadayoshi Kohno. Cryptography Engineering. Indianapolis, Indiana: Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781118722367.
Der volle Inhalt der QuelleBlaze, Matt, Hrsg. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36504-4.
Der volle Inhalt der QuelleBuchteile zum Thema "Cryptography"
Hofheinz, Dennis, und Eike Kiltz. „Scalable Cryptography“. In Lecture Notes in Computer Science, 169–78. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-21534-6_9.
Der volle Inhalt der QuelleBuchmann, Johannes. „Sustainable Cryptography“. In International Symposium on Mathematics, Quantum Theory, and Cryptography, 3. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5191-8_1.
Der volle Inhalt der QuelleHardy, Yorick, und Willi-Hans Steeb. „Cryptography“. In Classical and Quantum Computing, 215–28. Basel: Birkhäuser Basel, 2001. http://dx.doi.org/10.1007/978-3-0348-8366-5_11.
Der volle Inhalt der QuelleWallis, W. D. „Cryptography“. In Mathematics in the Real World, 157–67. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-8529-2_11.
Der volle Inhalt der QuelleO’Regan, Gerard. „Cryptography“. In Texts in Computer Science, 155–70. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44561-8_10.
Der volle Inhalt der QuelleKoblitz, Neal. „Cryptography“. In Mathematics Unlimited — 2001 and Beyond, 749–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/978-3-642-56478-9_38.
Der volle Inhalt der QuelleKizza, Joseph Migga. „Cryptography“. In Guide to Computer Network Security, 225–48. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_11.
Der volle Inhalt der QuelleCorsini, Piergiulio, und Violeta Leoreanu. „Cryptography“. In Applications of Hyperstructure Theory, 247–56. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4757-3714-1_8.
Der volle Inhalt der QuelleHansmann, Uwe, Martin S. Nicklous, Thomas Schäck und Frank Seliger. „Cryptography“. In Smart Card Application Development Using Java, 49–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-642-98052-7_4.
Der volle Inhalt der QuelleNorberg, Scott. „Cryptography“. In Advanced ASP.NET Core 3 Security, 57–101. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6014-2_3.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Cryptography"
Jovanović, Boriša, Ivan Tot und Silvana Ilić. „Contemporary cryptography: Recent achievement and research perspectives“. In 11th International Scientific Conference on Defensive Technologies - OTEX 2024, 376–80. Military Technical Institute, Belgrade, 2024. http://dx.doi.org/10.5937/oteh24067j.
Der volle Inhalt der QuelleSlutsky, Boris A., R. Rao, L. Tancevski, P. C. Sun und Y. Fainman. „Information Leakage Estimates in Quantum Cryptography“. In Optics in Computing. Washington, D.C.: Optica Publishing Group, 1997. http://dx.doi.org/10.1364/oc.1997.owc.2.
Der volle Inhalt der QuelleFaz-Hernández, Armando, und Julio López. „High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves“. In Concurso de Teses e Dissertações. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/ctd.2023.230156.
Der volle Inhalt der QuelleFaz-Hernandez, Armando, und Julio López. „High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves“. In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais, 49–56. Sociedade Brasileira de Computação - SBC, 2024. http://dx.doi.org/10.5753/sbseg_estendido.2024.241959.
Der volle Inhalt der QuelleDuta, Cristinaloredana, und Laura Gheorghe. „ELEARNING FRAMEWORK FOR UNDERSTANDING CRYPTOGRAPHY AT ALL LEVELS“. In eLSE 2015. Carol I National Defence University Publishing House, 2015. http://dx.doi.org/10.12753/2066-026x-15-026.
Der volle Inhalt der QuelleЛацин, Семен Михайлович, und Наталья Александровна Борсук. „ANALYSIS OF ELLIPTICAL CRYPTOGRAPHY ON THE EXAMPLE OF THE BITCOIN BLOCKCHAIN“. In Методики фундаментальных и прикладных научных исследований: сборник статей всероссийской научной конференции (Санкт-Петербург, Декабрь 2022). Crossref, 2023. http://dx.doi.org/10.37539/221223.2022.83.11.008.
Der volle Inhalt der QuelleBraga, Alexandre, und Ricardo Dahab. „A Longitudinal and Retrospective Study on How Developers Misuse Cryptography in Online Communities“. In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/sbseg.2017.19488.
Der volle Inhalt der QuelleRodrigues, Gustavo Eloi de P., Alexandre M. Braga und Ricardo Dahab. „A machine learning approach to detect misuse of cryptographic APIs in source code“. In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19223.
Der volle Inhalt der Quelle„Medical Image Security Using Quantum Cryptography“. In InSITE 2018: Informing Science + IT Education Conferences: La Verne California. Informing Science Institute, 2018. http://dx.doi.org/10.28945/3968.
Der volle Inhalt der QuelleOrisaka, Gabriell, Diego F. Aranha und Julio López. „Finite Field Arithmetic Using AVX-512 For Isogeny-Based Cryptography“. In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais, 385–92. Sociedade Brasileira de Computação - SBC, 2018. http://dx.doi.org/10.5753/sbseg.2018.4269.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Cryptography"
de Abreu, Jonas, und Mariana Cunha e Melo. Extending Pix: An approach to offline Dynamic QR Code generation. Center for Technology and Public Interest, SL, April 2023. http://dx.doi.org/10.59262/9qu6ex.
Der volle Inhalt der QuelleNechvatal, James. Public-key cryptography. Gaithersburg, MD: National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.sp.800-2.
Der volle Inhalt der QuelleMouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, Juli 2021. http://dx.doi.org/10.6028/nist.ir.8319.
Der volle Inhalt der QuelleJonsson, J., und B. Kaliski. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. RFC Editor, Februar 2003. http://dx.doi.org/10.17487/rfc3447.
Der volle Inhalt der QuelleBlake-Wilson, S., D. Brown und P. Lambert. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). RFC Editor, April 2002. http://dx.doi.org/10.17487/rfc3278.
Der volle Inhalt der QuelleTurner, S., und D. Brown. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). RFC Editor, Januar 2010. http://dx.doi.org/10.17487/rfc5753.
Der volle Inhalt der QuelleDraelos, Timothy John, Mark Dolan Torgerson, William Douglas Neumann, Donald R. Gallup, Michael Joseph Collins und Cheryl Lynn Beaver. Hybrid cryptography key management. Office of Scientific and Technical Information (OSTI), November 2003. http://dx.doi.org/10.2172/918318.
Der volle Inhalt der QuelleMcKay, Kerry A., Larry Bassham, Meltem Sonmez Turan und Nicky Mouha. Report on lightweight cryptography. Gaithersburg, MD: National Institute of Standards and Technology, März 2017. http://dx.doi.org/10.6028/nist.ir.8114.
Der volle Inhalt der QuelleTorgerson, Mark Dolan, Timothy John Draelos, Richard Crabtree Schroeppel, Russell D. Miller und William Erik Anderson. Small circuits for cryptography. Office of Scientific and Technical Information (OSTI), Oktober 2005. http://dx.doi.org/10.2172/875977.
Der volle Inhalt der QuelleMcGrew, D., K. Igoe und M. Salter. Fundamental Elliptic Curve Cryptography Algorithms. RFC Editor, Februar 2011. http://dx.doi.org/10.17487/rfc6090.
Der volle Inhalt der Quelle