Academic literature on the topic 'Applied cryptology'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Applied cryptology.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Applied cryptology"
Madhavan, C. E. Veni, and P. K. Saxena. "Recent Trends in Applied Cryptology." IETE Technical Review 20, no. 2 (March 2003): 119–28. http://dx.doi.org/10.1080/02564602.2003.11417076.
Full textJohnson, Mike. "CRYPTOLOGY IN CYBERSPACE." Cryptologia 19, no. 4 (October 1995): 392–96. http://dx.doi.org/10.1080/0161-119591884042.
Full textWinkel, Brian J. "EXTRAORDINARY CRYPTOLOGY COLLECTION." Cryptologia 27, no. 2 (April 2003): 180–81. http://dx.doi.org/10.1080/0161-110391891847.
Full textDanziger, Moises, and Marco Aurelio Amaral Henriques. "Computational Intelligence Applied on Cryptology: a brief review." IEEE Latin America Transactions 10, no. 3 (April 2012): 1798–810. http://dx.doi.org/10.1109/tla.2012.6222587.
Full textBauer, Craig, and Suzanne E. Gladfelter. "CRYPTOLOGY IN YORK PENNSYLVANIA." Cryptologia 29, no. 2 (April 2005): 159–75. http://dx.doi.org/10.1080/0161-110591893861.
Full textRocca, Charles F. "CRYPTOLOGY IN GENERAL EDUCATION." Cryptologia 29, no. 4 (October 2005): 337–42. http://dx.doi.org/10.1080/0161-110591893915.
Full textKruh, Louis. "CRYPTOLOGY IN AMERICAN HISTORY." Cryptologia 29, no. 3 (July 2005): 280. http://dx.doi.org/10.1080/01611190508951315.
Full textPatterson, Wayne. "The Cryptology of Baseball." Cryptologia 35, no. 2 (March 31, 2011): 156–63. http://dx.doi.org/10.1080/01611194.2011.558979.
Full textVarnovsky, N. P., A. I. Verchenko, and E. A. Primenko. "Mathematical problems in cryptology." Journal of Soviet Mathematics 67, no. 6 (December 1993): 3373–406. http://dx.doi.org/10.1007/bf01096271.
Full textKRUH, LOUIS. "CRYPTOLOGY AND THE LAW - III." Cryptologia 9, no. 3 (July 1985): 273–85. http://dx.doi.org/10.1080/0161-118591860003.
Full textDissertations / Theses on the topic "Applied cryptology"
Souza, Gwendolyn Rae. "The Evolution of Cryptology." CSUSB ScholarWorks, 2016. https://scholarworks.lib.csusb.edu/etd/572.
Full textKeuffer, Julien. "Calcul vérifiable et vérification biométrique." Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS156.
Full textThis thesis deals with the notion of verifiable computation, which aims at adding a proof of correctness to the result of a computation. Besides, verifying the proof should be more efficient than executing it. Verifiable computation protocols pave the way for delegation of computations to an untrusted party. The first part of this thesis introduces the background required to understand the most important verifiable computation protocols and describes their construction. Many protocols have been proposed since 2012 and some are nearly practical, but the prover often lacks efficiency. Even though several specialized protocols are very efficient, it seems more appropriate to consider protocols that can verify a large class of computations, in order to avoid the multiplications of proofs for each sub-computation. In the second part of this thesis, we leverage proof composition to obtain a non-interactive verifiable computation protocol with a more efficient prover while keeping the expressiveness of the scheme. Some of the existing verifiable computation systems reach additional properties and provide zero-knowledge for the proof with little overhead for the prover. We propose two applications that leverage this property to design new primitives. This first one enables to modify a signed document while keeping a form of authenticity. The second one allows for a privacy-preserving biometric authentication
Books on the topic "Applied cryptology"
service), SpringerLink (Online, ed. Applied Informatics and Communication: International Conference, ICAIC 2011, Xi’an, China, August 20-21, 2011, Proceedings, Part V. Berlin, Heidelberg: Springer-Verlag GmbH Berlin Heidelberg, 2011.
Find full textR, Hankerson Darrel, ed. Coding theory and cryptography: The essentials. 2nd ed. New York: M. Dekker, 2000.
Find full textR, Hankerson Darrel, ed. Coding theory and cryptography: The essentials. 2nd ed. New York: M. Dekker, 2000.
Find full textS, DeSilva Christopher J., ed. Fundamentals of information theory and coding design. Boca Raton, FL: Chapman & Hall/CRC, 2002.
Find full textApplied Informatics And Communication. Springer, 2011.
Find full textApplied Informatics And Communication. Springer, 2011.
Find full textApplied Informatics and Communication Part 2 Communications in Computer and Information Science. Springer, 2011.
Find full textHoffman, Gary, D. C. Hankerson, D. A. Leonard, K. T. Phelps, C. A. Rodger, J. R. Wall, and Charles C. Lindner. Coding Theory and Cryptography: The Essentials, Second Edition, Revised and Expanded (Pure and Applied Mathematics). 2nd ed. CRC, 2000.
Find full textApplied Informatics And Communication International Conference Icaic 2011 Xian China August 2021 2011 Proceedings. Springer, 2011.
Find full textHoffman, Gary, K. T. Phelps, Charles C. Lindner, D. A. Leonard, and D. C. Hankerson. Coding Theory and Cryptography: The Essentials, Second Edition. Taylor & Francis Group, 2000.
Find full textBook chapters on the topic "Applied cryptology"
Li, Xiangxi, Yu Zhang, and Yuxin Deng. "Verifying Anonymous Credential Systems in Applied Pi Calculus." In Cryptology and Network Security, 209–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10433-6_14.
Full textJoux, Antoine. "A Tutorial on High Performance Computing Applied to Cryptanalysis." In Advances in Cryptology – EUROCRYPT 2012, 1–7. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29011-4_1.
Full textYazdani, Hossein, and Kazimierz Choroś. "Comparative Analysis of Accuracy of Fuzzy Clustering Methods Applied for Image Processing." In Cryptology and Network Security, 89–98. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98678-4_11.
Full textBisheh-Niasar, Mojtaba, Reza Azarderakhsh, and Mehran Mozaffari-Kermani. "A Monolithic Hardware Implementation of Kyber: Comparing Apples to Apples in PQC Candidates." In Progress in Cryptology – LATINCRYPT 2021, 108–26. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-88238-9_6.
Full textAwad, Wasan, and El-Sayed M. El-Alfy. "Computational Intelligence in Cryptology." In Improving Information Security Practices through Computational Intelligence, 28–44. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9426-2.ch002.
Full textAkarsu, Hikmet Temel. "The Art of the Post-Modern Era and the Da Vinci Code." In Architecture in Contemporary Literature, 120–26. BENTHAM SCIENCE PUBLISHERS, 2023. http://dx.doi.org/10.2174/9789815165166123010016.
Full textConference papers on the topic "Applied cryptology"
Jevremović, Aleksandar, Nenad Ristić, and Mladen Veinović. "Using cryptology models for protecting PHP source code." In 11TH INTERNATIONAL CONFERENCE OF NUMERICAL ANALYSIS AND APPLIED MATHEMATICS 2013: ICNAAM 2013. AIP, 2013. http://dx.doi.org/10.1063/1.4825491.
Full text