Academic literature on the topic 'Advanced cryptographic techniques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Advanced cryptographic techniques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Advanced cryptographic techniques"
Abudalou, Mohammad. "Enhancing Data Security through Advanced Cryptographic Techniques." International Journal of Computer Science and Mobile Computing 13, no. 1 (January 30, 2024): 88–92. http://dx.doi.org/10.47760/ijcsmc.2024.v13i01.007.
Full textKarantjias, Athanasios, and Nineta Polemi. "Assessment of advanced cryptographic antiviral techniques." International Journal of Electronic Security and Digital Forensics 3, no. 1 (2010): 60. http://dx.doi.org/10.1504/ijesdf.2010.032331.
Full textViresh, Kasheenath Babaleshwar, Karade Sinchana, N. Sakshi, and Naidu Anush. "Audio encryption and decryption using AES algorithm technique." i-manager’s Journal on Electronics Engineering 14, no. 2 (2024): 8. http://dx.doi.org/10.26634/jele.14.2.20486.
Full textLewis, Nehama, Yaron Connelly, Gil Henkin, Max Leibovich, and Adi Akavia. "Factors Influencing the Adoption of Advanced Cryptographic Techniques for Data Protection of Patient Medical Records." Healthcare Informatics Research 28, no. 2 (April 30, 2022): 132–42. http://dx.doi.org/10.4258/hir.2022.28.2.132.
Full textHieu, Phan Duong, and Moti Yung. "PRIVACY IN ADVANCED CRYPTOGRAPHIC PROTOCOLS: PROTOTYPICAL EXAMPLES." Journal of Computer Science and Cybernetics 37, no. 4 (October 12, 2021): 429–51. http://dx.doi.org/10.15625/1813-9663/37/4/16104.
Full textMalhotra, Anoushka, Ashwin Arora, and Dr Manjot Kaur Bhatia. "Symmetric Cryptographic Approaches." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 718–21. http://dx.doi.org/10.22214/ijraset.2022.47982.
Full textSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications." Mathematical Statistician and Engineering Applications 70, no. 1 (January 31, 2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Full textMark Espalmado, John, and Edwin Arboleda. "DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (April 1, 2017): 1032. http://dx.doi.org/10.11591/ijece.v7i2.pp1032-1041.
Full textFeilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense." Journal of Electrical Systems 19, no. 4 (January 25, 2024): 227–40. http://dx.doi.org/10.52783/jes.635.
Full textParthasarathy, Rajamohan, Seow Soon Loong, and Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques." Journal of Engineering & Technological Advances 3, no. 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.
Full textDissertations / Theses on the topic "Advanced cryptographic techniques"
Ibarrondo, Luis Alberto. "Privacy-preserving biometric recognition systems with advanced cryptographic techniques." Electronic Thesis or Diss., Sorbonne université, 2023. https://theses.hal.science/tel-04058954.
Full textDealing with highly sensitive data, identity management systems must provide adequate privacy protection as they leverage biometrics technology. Wielding Multi-Party Computation (MPC), Homomorphic Encryption (HE) and Functional Encryption (FE), this thesis tackles the design and implementation of practical privacy-preserving biometric systems, from the feature extraction to the matching with enrolled users. This work is consecrated to the design of secure biometric solutions for multiple scenarios, putting special care to balance accuracy and performance with the security guarantees, while improving upon existing works in the domain. We go beyond privacy preservation against semi-honest adversaries by also ensuring correctness facing malicious adversaries. Lastly, we address the leakage of biometric data when revealing the output, a privacy concern often overlooked in the literature. The main contributions of this thesis are: • A new face identification solution built on FE-based private inner product matching mitigating input leakage. • A novel efficient two-party computation protocol, Funshade, to preserve the privacy of biometric thresholded distance metric operations. • An innovative method to perform privacy-preserving biometric identification based on the notion of group testing named Grote. • A new distributed decryption protocol with collaborative masking addressing input leakage, dubbed Colmade. • An honest majority three-party computation protocol, Banners, to perform maliciously secure inference of Binarized Neural Networks. • A HE Python library named Pyfhel, offering a high-level abstraction and low-level functionalities, with applications in teaching
Escala, Ribas Alex. "Advanced cryptographic techniques for building verifiable and transparent electronic voting protocols." Doctoral thesis, Universitat Politècnica de Catalunya, 2017. http://hdl.handle.net/10803/457585.
Full textEls sistemes de vot electrònic presenten molts reptes a causa dels seus múltiples requeriments. Alguns d'aquests reptes estan relacionats amb garantir la privacitat del votant i la transparència del sistema, requisits que són difícils de satisfer al mateix temps. D'altra banda, els sistemes de vot electrònic presenten altres reptes com la usabilitat, sobretot de cara als votants. En aquesta tesi estudiem dos problemes del vot electrònic. La verificabilitat "cast-as-intended" tracta d'obtenir mecanismes que garanteixin al votant que el seu vot correspon a les seves preferències. Les propostes actuals posen la càrrega de la verificació en el votant, cosa que no és desitjable en eleccions del món real, on participen votants amb diferents graus de coneixements tècnics. Nosaltres introduïm el concepte de "universal cast-as-intended verifiability", que proporciona mecanismes per a que qualsevol entitat de l'elecció pugui comprovar que qualsevol vot conté les preferències del votant que l'ha emès - sense revelar el contingut del vot. A banda de definir formalment el concepte de "universal cast-as-intended verifiability" també proposem un protocol de vot electrònic que satisfà aquesta propietat. L'altre problema que hem estudiat és el problema dels vots invàlids en eleccions electròniques. Un dels avantatges del vot electrònic és que permet evitar que els votants emetin vots nuls sense voler. Per això, si durant el recompte de l'elecció apareixen vots nuls construïts intencionadament es pot crear desconfiança en el sistema de vot. Els usuaris del sistema de vot poden pensar que el sistema té forats de seguretat o que ha estat atacat. Per evitar aquesta situació, definim el concepte de "vote validatability", una propietat dels sistemes de vot electrònic que garanteix que els vots nuls es poden identificar en el moment que s'emeten. En aquesta tesi hem definit formalment aquesta propietat i hem dissenyat un protocol que la satisfà. Tots aquests requisits de seguretat dels protocols de vot electrònic s'implementen amb eines criptogràfiques. Les principals eines que s'utilitzen són esquemes de xifrat, esquemes de firma i proves de coneixement zero. Una prova de coneixement zero permet a una entitat convèncer una altra entitat que una sentència és certa sense donar cap altra informació que la certesa de la sentència. Aquestes proves de coneixement zero es poden fer servir, per exemple, per demostrar que el recompte de l'elecció s'ha fet correctament. Recentment, Groth i Sahai han construït proves de coneixement zero que es poden fer servir per un ampli ventall de sentències com per exemple sentències que apareixen en protocols de vot electrònic. En aquesta tesi hem fet dos contribucions sobre les proves de Groth i Sahai. Per una banda donem un marc teòric que permet derivar hipòtesis criptogràfiques per construir protocols criptogràfics. En particular, construïm noves proves de Groth i Sahai millorant l'eficiència de les construccions existents. De manera independent, indiquem com les proves de Groth i Sahai es poden estendre per fer-les compatibles amb un ventall més ampli de sentències, millorem l'eficiència de les proves de Groth i Sahai per moltes d'aquestes sentències i, en particular, quan es fan servir per demostrar múltiples sentències.
Hartung, Gunnar Richard [Verfasser], and J. [Akademischer Betreuer] Müller-Quade. "Advanced Cryptographic Techniques for Protecting Log Data / Gunnar Richard Hartung ; Betreuer: J. Müller-Quade." Karlsruhe : KIT-Bibliothek, 2020. http://d-nb.info/1206646683/34.
Full textSantiago, Pinazo Sonia. "Advanced Features in Protocol Verification: Theory, Properties, and Efficiency in Maude-NPA." Doctoral thesis, Universitat Politècnica de València, 2015. http://hdl.handle.net/10251/48527.
Full textSantiago Pinazo, S. (2015). Advanced Features in Protocol Verification: Theory, Properties, and Efficiency in Maude-NPA [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/48527
TESIS
Bozdemir, Beyza. "Privacy-preserving machine learning techniques." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS323.
Full textMachine Learning as a Service (MLaaS) refers to a service that enables companies to delegate their machine learning tasks to single or multiple untrusted but powerful third parties, namely cloud servers. Thanks to MLaaS, the need for computational resources and domain expertise required to execute machine learning techniques is significantly reduced. Nevertheless, companies face increasing challenges with ensuring data privacy guarantees and compliance with the data protection regulations. Executing machine learning tasks over sensitive data requires the design of privacy-preserving protocols for machine learning techniques.In this thesis, we aim to design such protocols for MLaaS and study three machine learning techniques: Neural network classification, trajectory clustering, and data aggregation under privacy protection. In our solutions, our goal is to guarantee data privacy while keeping an acceptable level of performance and accuracy/quality evaluation when executing the privacy-preserving variants of these machine learning techniques. In order to ensure data privacy, we employ several advanced cryptographic techniques: Secure two-party computation, homomorphic encryption, homomorphic proxy re-encryption, multi-key homomorphic encryption, and threshold homomorphic encryption. We have implemented our privacy-preserving protocols and studied the trade-off between privacy, efficiency, and accuracy/quality evaluation for each of them
Capraro, Ivan. "Advanced Techniques in Free Space Quantum Communication." Doctoral thesis, Università degli studi di Padova, 2008. http://hdl.handle.net/11577/3425561.
Full textBooks on the topic "Advanced cryptographic techniques"
Swenson, Christopher. Modern cryptanalysis: Techniques for advanced code breaking. Indianapolis, IN: Wiley Pub., 2008.
Find full text1949-, Beth Thomas, Cot N. 1945-, and Ingemarsson I. 1938-, eds. Advances in cryptology: Proceedings of EUROCRYPT 84, a Workshop on the Theory and Application of Cryptographic Techniques, Paris, France, April 9-11, 1984. Berlin: Springer-Verlag, 1985.
Find full textChristian, Cachin, and Camenisch Jan, eds. Advances in cryptology: EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004 : proceedings. Berlin: Springer, 2004.
Find full textEUROCRYPT '94 (1994 Perugia, Italy). Advances in cryptology--EUROCRYPT-94: Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994 : proceedings. Berlin: Springer-Verlag, 1995.
Find full text1945-, Quisquater J. J., and Guillou Louis C. 1947-, eds. Advances in cryptology, EUROCRYPT '95: International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995 : proceedings. Berlin: Springer, 1995.
Find full textWatts, Davies Donald, ed. Advances in cryptology--EUROCRYPT '91: Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, April 8-11, 1991 : proceedings. Berlin: Springer-Verlag, 1991.
Find full textEUROCRYPT, '88 (1988 Davos Switzerland). Advances in cryptology--EUROCRYPT '88: Workshop on the Theory and Application of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988 : proceedings. Berlin: Springer-Verlag, 1988.
Find full textEUROCRYPT '92 (1992 Balatonfüred, Hungary). Advances in cryptology--EUROCRYPT '92: Workshop on the Theory and Application of Cryptographic Techniques, Balatonfüred, Hungary, May 24-28, 1992 : proceedings. Berlin: Springer-Verlag, 1993.
Find full textAUSCRYPT '92 (1992 Gold Coast, Queensland, Australia). Advances in cryptology-AUSCRYPT '92: Workshop on the theory and application of cryptographic techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, proceedings. Berlin: Springer-Verlag, 1993.
Find full textEUROCRYPT '96 (1996 Zaragoza, Spain). Advances in cryptology, EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996 : proceedings. Berlin: Springer, 1996.
Find full textBook chapters on the topic "Advanced cryptographic techniques"
Kumar, J. Pradeep, P. Neelakanta Rao, and Neeraja koppula. "Secure Data Sharing in Images Using Cryptographic Approach." In Advanced Techniques for IoT Applications, 356–64. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4435-1_34.
Full textGoh, Alwyn, and David C. L. Ngo. "Computation of Cryptographic Keys from Face Biometrics." In Communications and Multimedia Security. Advanced Techniques for Network and Data Protection, 1–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45184-6_1.
Full textMohanta, Kshitish Kumar, Deena Sunil Sharanappa, and Vishnu Narayan Mishra. "Enhancing the security of public key cryptographic model based on integrated ElGamal-Elliptic Curve Diffe Hellman (EG-ECDH) key exchange technique." In Advanced Mathematical Techniques in Computational and Intelligent Systems, 72–87. Boca Raton: CRC Press, 2023. http://dx.doi.org/10.1201/9781003460169-6.
Full textLenin Solomon, A., and Narendran Rajagopalan. "Performance Analysis of Various Cryptographic Techniques." In Advances in Automation, Signal Processing, Instrumentation, and Control, 1671–79. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8221-9_156.
Full textSrivastava, Ananya, Aboli Khare, Priyaranjan Satapathy, and Ayes Chinmay. "Investigating Various Cryptographic Techniques Used in Cloud Computing." In Advances in Data Science and Management, 263–72. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0978-0_26.
Full textArun, V., D. Laxma Reddy, and K. Nishanth Rao. "A Novel Analysis of Efficient Energy Architecture in Cryptography." In Advanced Techniques for IoT Applications, 339–45. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4435-1_32.
Full textBasavaiah, Jagadeesh, Audre Arlene Anthony, and Chandrashekar Mohan Patil. "Visual Cryptography Using Hill Cipher and Advanced Hill Cipher Techniques." In Advances in VLSI, Signal Processing, Power Electronics, IoT, Communication and Embedded Systems, 429–43. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0443-0_34.
Full textSheikh, Shafiya Afzal, and M. Tariq Banday. "Secure E-mail Communications Through Cryptographic Techniques—A Study." In Advances in Intelligent Systems and Computing, 219–35. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1275-9_19.
Full textFischer, Michael, and Rebecca Wright. "An application of game theoretic techniques to cryptography." In Advances in Computational Complexity Theory, 99–118. Providence, Rhode Island: American Mathematical Society, 1993. http://dx.doi.org/10.1090/dimacs/013/06.
Full textSathya Priya, J., V. Krithikaa, S. Monika, and P. Nivethini. "Ensuring Security in Sharing of Information Using Cryptographic Technique." In Advances in Intelligent Systems and Computing, 33–39. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2182-5_3.
Full textConference papers on the topic "Advanced cryptographic techniques"
Ogiela, Marek R., Lidia Ogiela, and Urszula Ogiela. "Cryptographic Techniques in Advanced Information Management." In 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). IEEE, 2014. http://dx.doi.org/10.1109/imis.2014.31.
Full textOo, Bo Bo, and May Thu Aung. "Enhancing Secure Digital Communication Media Using Cryptographic Steganography Techniques." In 2020 International Conference on Advanced Information Technologies (ICAIT). IEEE, 2020. http://dx.doi.org/10.1109/icait51105.2020.9261790.
Full textOgiela, Lidia, and Marek R. Ogiela. "Bio-Inspired Cryptographic Techniques in Information Management Applications." In 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2016. http://dx.doi.org/10.1109/aina.2016.161.
Full textMihaljevic, Miodrag, Hideki Imai, Michael David, Kazukuni Kobara, and Hajime Watanabe. "On advanced cryptographic techniques for information security of smart grid AMI." In the Seventh Annual Workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2179298.2179371.
Full textFaz-Hernández, Armando, and Julio López. "High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves." In Concurso de Teses e Dissertações. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/ctd.2023.230156.
Full textKumar, Vishal, Shafaque Ahmareen, Manoj Kumar, Yogendra Narayan Prajapati, Bhasker Pant, and Sneha Bohra. "Enhancing OTP Generation Efficiency through Cryptographic Techniques." In 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). IEEE, 2023. http://dx.doi.org/10.1109/icacite57410.2023.10182488.
Full textPateriya, Pushpendra Kumar, Mritunjay Rai, Krishna Prasad Mukherjee, and Gaurav Raj. "A Lightweight Cryptographic Algorithm using Trigonometric Technique." In 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE, 2018. http://dx.doi.org/10.1109/icacce.2018.8441670.
Full textSomaschi, Niccolo. "Semiconductor quantum dot based single-photon sources as resources for quantum communication and cryptography applications." In Advanced Photon Counting Techniques XVI, edited by Mark A. Itzler, K. Alex McIntosh, and Joshua C. Bienfang. SPIE, 2022. http://dx.doi.org/10.1117/12.2618464.
Full textHill, Alexander D., Bradley Christensen, and Paul G. Kwiat. "Advanced techniques for free-space optical quantum cryptography over water." In SPIE LASE, edited by Hamid Hemmati and Don M. Boroson. SPIE, 2016. http://dx.doi.org/10.1117/12.2218270.
Full textVaibhavi, Aher, and Kulkarni Samidha. "Cryptography Technique for Data Hiding Application." In 2016 Sixth International Conference on Advanced Computing & Communication Technologies. Singapore: Research Publishing Services, 2016. http://dx.doi.org/10.3850/978-981-11-0783-2_420.
Full text