Zeitschriftenartikel zum Thema „Cryptography“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Cryptography" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Yan, Yuhan. „The Overview of Elliptic Curve Cryptography (ECC)“. Journal of Physics: Conference Series 2386, Nr. 1 (01.12.2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Der volle Inhalt der QuelleGoldreich, Oded. „Cryptography and cryptographic protocols“. Distributed Computing 16, Nr. 2-3 (01.09.2003): 177–99. http://dx.doi.org/10.1007/s00446-002-0077-1.
Der volle Inhalt der QuelleAnilkumar, Chunduru, Bhavani Gorle und Kinthali Sowmya. „A Secure Method of Communication in Conventional Cryptography using Quantum Key Distribution“. Applied and Computational Engineering 8, Nr. 1 (01.08.2023): 68–73. http://dx.doi.org/10.54254/2755-2721/8/20230083.
Der volle Inhalt der QuelleRusetskaya, Irina A. „CRYPTOGRAPHY. FROM THE PAST TO THE FUTURE“. RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, Nr. 4 (2021): 47–57. http://dx.doi.org/10.28995/2686-679x-2021-4-47-57.
Der volle Inhalt der QuelleGoyal, Rohit. „Quantum Cryptography: Secure Communication Beyond Classical Limits“. Journal of Quantum Science and Technology 1, Nr. 1 (31.03.2024): 1–5. http://dx.doi.org/10.36676/jqst.v1.i1.01.
Der volle Inhalt der QuelleVictor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat und Abdullayeva Shakhzoda. „Cryptography: Advances in Secure Communication and Data Protection“. E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.
Der volle Inhalt der QuelleAnilkumar, Chunduru, Swathi Lenka, N. Neelima und Sathishkumar V E. „A Secure Method of Communication Through BB84 Protocol in Quantum Key Distribution“. Scalable Computing: Practice and Experience 25, Nr. 1 (04.01.2024): 21–33. http://dx.doi.org/10.12694/scpe.v25i1.2152.
Der volle Inhalt der QuelleWANG, XINGYUAN, MING LIU und NINI GU. „TWO NEW CHAOTIC CRYPTOGRAPHIES BASED ON DIFFERENT ATTRACTOR-PARTITION ALGORITHMS“. International Journal of Modern Physics B 21, Nr. 27 (30.10.2007): 4739–50. http://dx.doi.org/10.1142/s0217979207038071.
Der volle Inhalt der QuelleShashi Raj K. „The Intersection of Algebra and Cryptography: Enhancing Information Security through Mathematical Foundations“. Communications on Applied Nonlinear Analysis 31, Nr. 4s (05.07.2024): 466–89. http://dx.doi.org/10.52783/cana.v31.943.
Der volle Inhalt der QuelleYadav, Sonam. „An Extensive Study on Lattice-Based Cryptography and its Applications for RLWE-Based Problems“. Universal Research Reports 10, Nr. 3 (2023): 104–10. http://dx.doi.org/10.36676/urr.2023-v10i3-014.
Der volle Inhalt der QuelleOh, Chaerin, Woosang Im, Hyunil Kim und Changho Seo. „Recent Trends in Cryptanalysis Techniques for White-box Block Ciphers“. Korean Institute of Smart Media 12, Nr. 9 (30.10.2023): 9–18. http://dx.doi.org/10.30693/smj.2023.12.9.9.
Der volle Inhalt der QuelleBAFTIU, Naim. „Analysis and use of Cryptography techniques in programming language C#: Coding and Decoding“. PRIZREN SOCIAL SCIENCE JOURNAL 4, Nr. 3 (31.12.2020): 1–10. http://dx.doi.org/10.32936/pssj.v4i3.165.
Der volle Inhalt der QuelleVirk, Udayveer Singh, Devansh Verma, Gagandeep Singh und Prof Sheetal Laroiya Prof. Sheetal Laroiya. „Analyzing Cryptographic Techniques and Machine Learning Algorithms for Crime Prediction“. INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, Nr. 10 (22.10.2024): 1–6. http://dx.doi.org/10.55041/ijsrem38099.
Der volle Inhalt der QuelleHammad, Baraa Tareq, Ali Maki Sagheer, Ismail Taha Ahmed und Norziana Jamil. „A comparative review on symmetric and asymmetric DNA-based cryptography“. Bulletin of Electrical Engineering and Informatics 9, Nr. 6 (01.12.2020): 2484–91. http://dx.doi.org/10.11591/eei.v9i6.2470.
Der volle Inhalt der QuelleKumar,, Varun. „Challenges and Future Trends of Cryptography in Internet of Things“. INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, Nr. 04 (10.04.2024): 1–5. http://dx.doi.org/10.55041/ijsrem30505.
Der volle Inhalt der QuelleEt. al., Mandru Manisha,. „Colour Visual Cryptography (3,3) Scheme“. Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, Nr. 2 (10.04.2021): 3189–98. http://dx.doi.org/10.17762/turcomat.v12i2.2374.
Der volle Inhalt der QuelleTeja, Penumantra Satya Sai, Mounika Lakshmi P und Vinay Kumar K. „A Secure Communication through Quantum Key Distribution Protocols“. International Research Journal of Electronics and Computer Engineering 4, Nr. 3 (30.09.2018): 14. http://dx.doi.org/10.24178/irjece.2018.4.3.14.
Der volle Inhalt der QuelleSabani, Maria E., Ilias K. Savvas und Georgia Garani. „Learning with Errors: A Lattice-Based Keystone of Post-Quantum Cryptography“. Signals 5, Nr. 2 (13.04.2024): 216–43. http://dx.doi.org/10.3390/signals5020012.
Der volle Inhalt der QuelleDabola, Shashank. „Chat Secure-Messaging Application Based on Secure Encryption Algorithm“. International Journal for Research in Applied Science and Engineering Technology 12, Nr. 3 (31.03.2024): 303–5. http://dx.doi.org/10.22214/ijraset.2024.58817.
Der volle Inhalt der QuelleAnnu. „Algebraic Structures and Their Applications in Modern Cryptography“. Innovative Research Thoughts 10, Nr. 3 (25.07.2024): 52–59. http://dx.doi.org/10.36676/irt.v10.i3.1433.
Der volle Inhalt der QuelleSingh, Sukhveer. „Investigation of Cryptography for Secure Communication and Data Privacy Applications“. Mathematical Statistician and Engineering Applications 70, Nr. 1 (31.01.2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Der volle Inhalt der QuelleKhamalwa, Mulemi Simiyu. „Exploring how Commutative Algebra Underpins Cryptographic Protocols and Encryption Methods Used in Secure Communications and Data Protection“. NEWPORT INTERNATIONAL JOURNAL OF SCIENTIFIC AND EXPERIMENTAL SCIENCES 5, Nr. 3 (14.06.2024): 58–62. http://dx.doi.org/10.59298/nijses/2024/10.5.586237.
Der volle Inhalt der QuelleDubey, Praveer, und Ompal Yadav. „A Survey on Quantum cryptography versus classical Cryptography“. International Journal of Current Engineering and Technology 10, Nr. 06 (31.10.2021): 910–13. http://dx.doi.org/10.14741/ijcet/v.10.6.3.
Der volle Inhalt der QuelleAkram, Zaryab. „Cryptology Based on Laplace Transform of Hyperbolic Function and Matrix Decomposition Method“. ECS Meeting Abstracts MA2022-02, Nr. 64 (09.10.2022): 2364. http://dx.doi.org/10.1149/ma2022-02642364mtgabs.
Der volle Inhalt der QuelleChandre, Pankaj R., Bhagyashree D. Shendkar, Sayalee Deshmukh, Sameer Kakade und Suvarna Potdukhe. „Machine Learning-Enhanced Advancements in Quantum Cryptography: A Comprehensive Review and Future Prospects“. International Journal on Recent and Innovation Trends in Computing and Communication 11, Nr. 11s (10.10.2023): 642–55. http://dx.doi.org/10.17762/ijritcc.v11i11s.8300.
Der volle Inhalt der QuelleShah, Aayush, Prabhat Mahato und Aadarsh Bhagat. „Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm“. International Journal for Research in Applied Science and Engineering Technology 11, Nr. 8 (31.08.2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Der volle Inhalt der QuelleBala, Romi, und Hemant Pandey. „Advances in Discrete Mathematics: From Combinatorics to Cryptography“. Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, Nr. 3 (13.12.2019): 1643–46. http://dx.doi.org/10.61841/turcomat.v10i3.14624.
Der volle Inhalt der QuelleSedat Sonko, Kenneth Ifeanyi Ibekwe, Valentine Ikenna Ilojianya, Emmanuel Augustine Etukudoh und Adefunke Fabuyide. „QUANTUM CRYPTOGRAPHY AND U.S. DIGITAL SECURITY: A COMPREHENSIVE REVIEW: INVESTIGATING THE POTENTIAL OF QUANTUM TECHNOLOGIES IN CREATING UNBREAKABLE ENCRYPTION AND THEIR FUTURE IN NATIONAL SECURITY“. Computer Science & IT Research Journal 5, Nr. 2 (18.02.2024): 390–414. http://dx.doi.org/10.51594/csitrj.v5i2.790.
Der volle Inhalt der QuelleDhakne, Dr Amol, Prasann Shimpi, Sanket Halake, Shivam Dharmshetti und Shashank Singh. „Neural Network Based Message Concealment Scheme“. International Journal for Research in Applied Science and Engineering Technology 10, Nr. 5 (31.05.2022): 1368–78. http://dx.doi.org/10.22214/ijraset.2022.42522.
Der volle Inhalt der QuelleOlajide Soji Osundare, Chidiebere Somadina Ike, Ololade Gilbert Fakeyede und Adebimpe Bolatito Ige. „Blockchain and quantum cryptography: Future of secure telecommunications in banking“. Engineering Science & Technology Journal 3, Nr. 2 (30.12.2022): 154–71. http://dx.doi.org/10.51594/estj.v3i2.1523.
Der volle Inhalt der QuellePriya, R. Shanmuga, und A. Senthilkumar. „A Study on Visual Cryptography for Colour Images“. International Journal of Advanced Research in Computer Science and Software Engineering 7, Nr. 7 (01.08.2017): 260. http://dx.doi.org/10.23956/ijarcsse/v7i7/0172.
Der volle Inhalt der QuelleKaushal, Milind. „Cryptography: A Brief Review“. International Journal for Research in Applied Science and Engineering Technology 10, Nr. 2 (28.02.2022): 763–67. http://dx.doi.org/10.22214/ijraset.2022.40401.
Der volle Inhalt der QuelleWang, Xing, Qiang Zhang und Xiao Peng Wei. „A New Encryption Method Based on Rijndael Algorithm and DNA Computing“. Applied Mechanics and Materials 20-23 (Januar 2010): 1241–46. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1241.
Der volle Inhalt der QuelleSankhyan, Bhanu. „Review on Symmetric and Asymmetric Cryptography“. International Journal for Research in Applied Science and Engineering Technology 12, Nr. 3 (31.03.2024): 2934–40. http://dx.doi.org/10.22214/ijraset.2024.59538.
Der volle Inhalt der QuelleAbbasi, Faisal. „Quantum Cryptography: The Future of Internet and Security Management“. Journal of Management and Service Science (JMSS) 1, Nr. 1 (2021): 1–12. http://dx.doi.org/10.54060/jmss/001.01.004.
Der volle Inhalt der QuelleBharati A. Patil, Prajakta R. Toke und Sharyu S. Naiknavare. „Research on Various Cryptography Techniques“. International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, Nr. 2 (22.04.2024): 685–92. http://dx.doi.org/10.32628/cseit2410290.
Der volle Inhalt der QuelleGeetha, M., und K. Akila. „SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS“. IJISCS (International Journal of Information System and Computer Science) 2, Nr. 3 (14.03.2019): 123. http://dx.doi.org/10.56327/ijiscs.v2i3.708.
Der volle Inhalt der QuelleB S, Aditya, und Sharadadevi Kaganurmath. „Use of Cryptography and Signing for Network Security“. International Journal for Research in Applied Science and Engineering Technology 10, Nr. 7 (31.07.2022): 4080–83. http://dx.doi.org/10.22214/ijraset.2022.45926.
Der volle Inhalt der QuelleSabaya, Dinaeli Paul, Adam Aloyce Semlambo und Joel Kazoba Simon. „Data Security Through Crypto-Stegano Systems“. International Journal of Computational Science, Information Technology and Control Engineering 10, Nr. 1/2/3 (27.07.2023): 1–23. http://dx.doi.org/10.5121/ijcsitce.2023.10301.
Der volle Inhalt der QuelleNana, Nana, und Puguh Wahyu Prasetyo. „An implementation of Hill cipher and 3x3x3 rubik's cube to enhance communication security“. Bulletin of Applied Mathematics and Mathematics Education 1, Nr. 2 (10.12.2021): 75–92. http://dx.doi.org/10.12928/bamme.v1i2.4252.
Der volle Inhalt der QuelleRani, Rashmi. „Quantum Cryptography: Fundamentals and Advanced Techniques“. International Journal for Research in Applied Science and Engineering Technology 12, Nr. 5 (31.05.2024): 5747–51. http://dx.doi.org/10.22214/ijraset.2024.62943.
Der volle Inhalt der QuelleVignesh, R. Sakthi, S. Sudharssun und K. J. Jegadish kumar. „Contemporary Cryptography and Arguments for Classical Cryptography's Endurance alongside the Propitious Quantum Cryptography“. International Journal of Computer Applications 1, Nr. 26 (25.02.2010): 59–64. http://dx.doi.org/10.5120/479-786.
Der volle Inhalt der QuelleLohith D K und Sanjay M. „A system of symmetric key cryptography using deep learning“. Global Journal of Engineering and Technology Advances 20, Nr. 2 (30.08.2024): 081–89. http://dx.doi.org/10.30574/gjeta.2024.20.2.0139.
Der volle Inhalt der QuelleViresh, Kasheenath Babaleshwar, Karade Sinchana, N. Sakshi und Naidu Anush. „Audio encryption and decryption using AES algorithm technique“. i-manager’s Journal on Electronics Engineering 14, Nr. 2 (2024): 8. http://dx.doi.org/10.26634/jele.14.2.20486.
Der volle Inhalt der QuelleDrzazga, Bartosz, und Łukasz Krzywiecki. „Review of Chosen Isogeny-Based Cryptographic Schemes“. Cryptography 6, Nr. 2 (31.05.2022): 27. http://dx.doi.org/10.3390/cryptography6020027.
Der volle Inhalt der QuelleIrawan, Muhammad Dedi. „IMPLEMENTASI KRIPTOGRAFI VIGENERE CIPHER DENGAN PHP“. JURNAL TEKNOLOGI INFORMASI 1, Nr. 1 (01.06.2017): 11. http://dx.doi.org/10.36294/jurti.v1i1.21.
Der volle Inhalt der QuelleYalla, Surya Prakash, Archana Uriti, Abhisek Sethy und Sathishkumar V. E. „Secure method of communication using Quantum Key Distribution“. Applied and Computational Engineering 30, Nr. 1 (22.01.2024): 32–37. http://dx.doi.org/10.54254/2755-2721/30/20230065.
Der volle Inhalt der QuelleTama, Yanuar Bhakti Wira, und Muhammad Firdhausi Fahmi. „Sistem Kriptografi Klasik Dengan Memanfaatkan Orde Dari Grup Titik Pada Kurva Eliptik Bentuk Montgomery“. Euler : Jurnal Ilmiah Matematika, Sains dan Teknologi 11, Nr. 2 (16.12.2023): 361–71. http://dx.doi.org/10.37905/euler.v11i2.23009.
Der volle Inhalt der QuelleLiang, Yuheng. „A research on applications of neural network-based cryptography“. Applied and Computational Engineering 14, Nr. 1 (23.10.2023): 258–64. http://dx.doi.org/10.54254/2755-2721/14/20230798.
Der volle Inhalt der QuelleDarko, Cyprian Danso. „Data Security in the Cloud Using Multi-Modal Bio-Cryptographic Authentication“. Advances in Multidisciplinary and scientific Research Journal Publication 10, Nr. 4 (30.11.2022): 9–14. http://dx.doi.org/10.22624/aims/digital/v10n4p2.
Der volle Inhalt der Quelle