Journal articles on the topic 'Applied cryptology'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Applied cryptology.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Madhavan, C. E. Veni, and P. K. Saxena. "Recent Trends in Applied Cryptology." IETE Technical Review 20, no. 2 (March 2003): 119–28. http://dx.doi.org/10.1080/02564602.2003.11417076.
Full textJohnson, Mike. "CRYPTOLOGY IN CYBERSPACE." Cryptologia 19, no. 4 (October 1995): 392–96. http://dx.doi.org/10.1080/0161-119591884042.
Full textWinkel, Brian J. "EXTRAORDINARY CRYPTOLOGY COLLECTION." Cryptologia 27, no. 2 (April 2003): 180–81. http://dx.doi.org/10.1080/0161-110391891847.
Full textDanziger, Moises, and Marco Aurelio Amaral Henriques. "Computational Intelligence Applied on Cryptology: a brief review." IEEE Latin America Transactions 10, no. 3 (April 2012): 1798–810. http://dx.doi.org/10.1109/tla.2012.6222587.
Full textBauer, Craig, and Suzanne E. Gladfelter. "CRYPTOLOGY IN YORK PENNSYLVANIA." Cryptologia 29, no. 2 (April 2005): 159–75. http://dx.doi.org/10.1080/0161-110591893861.
Full textRocca, Charles F. "CRYPTOLOGY IN GENERAL EDUCATION." Cryptologia 29, no. 4 (October 2005): 337–42. http://dx.doi.org/10.1080/0161-110591893915.
Full textKruh, Louis. "CRYPTOLOGY IN AMERICAN HISTORY." Cryptologia 29, no. 3 (July 2005): 280. http://dx.doi.org/10.1080/01611190508951315.
Full textPatterson, Wayne. "The Cryptology of Baseball." Cryptologia 35, no. 2 (March 31, 2011): 156–63. http://dx.doi.org/10.1080/01611194.2011.558979.
Full textVarnovsky, N. P., A. I. Verchenko, and E. A. Primenko. "Mathematical problems in cryptology." Journal of Soviet Mathematics 67, no. 6 (December 1993): 3373–406. http://dx.doi.org/10.1007/bf01096271.
Full textKRUH, LOUIS. "CRYPTOLOGY AND THE LAW - III." Cryptologia 9, no. 3 (July 1985): 273–85. http://dx.doi.org/10.1080/0161-118591860003.
Full textKRUH, LOUIS. "CRYPTOLOGY AND THE LAW - IV." Cryptologia 9, no. 4 (October 1985): 348–50. http://dx.doi.org/10.1080/0161-118591860102.
Full textKRUH, LOUIS. "CRYPTOLOGY AND THE LAW - V." Cryptologia 10, no. 2 (April 1986): 101–7. http://dx.doi.org/10.1080/0161-118691860895.
Full textKRUH, LOUIS. "CRYPTOLOGY AND THE LAW - VI." Cryptologia 10, no. 3 (July 1986): 129–33. http://dx.doi.org/10.1080/0161-118691860949.
Full textKRUH, LOUIS. "CRYPTOLOGY AND THE LAW - VII." Cryptologia 10, no. 4 (October 1986): 248–53. http://dx.doi.org/10.1080/0161-118691861083.
Full textDeavours, C. A. "CRYPTOLOGY COURSES AT KEAN COLLEGE." Cryptologia 11, no. 1 (January 1987): 47–50. http://dx.doi.org/10.1080/0161-118791861794.
Full textKruh, Louis. "THE HERALDRY OF CRYPTOLOGY - ADDENDUM." Cryptologia 13, no. 1 (January 1989): 79–84. http://dx.doi.org/10.1080/0161-118991863790.
Full textvan der Meulen, Michael. "CRYPTOLOGY IN THE EARLY BUNDESREPUBLIK." Cryptologia 20, no. 3 (July 1996): 202–22. http://dx.doi.org/10.1080/0161-119691884915.
Full textKurt, Yesem. "Deciphering an Undergraduate Cryptology Course." Cryptologia 34, no. 2 (March 31, 2010): 155–62. http://dx.doi.org/10.1080/01611190903225421.
Full textBeth, Thomas, Willi Geiselmann, and Rainer Steinwandt. "Mathematical Techniques in Cryptology—Editorial." Applicable Algebra in Engineering, Communication and Computing 16, no. 6 (November 7, 2005): 377–78. http://dx.doi.org/10.1007/s00200-005-0182-z.
Full textMedeleanu, Florin. "Applied study on cryptographic functions for algorithms used in communications security protocols." Scientific Bulletin of Naval Academy XXIII, no. 1 (July 15, 2020): 243–47. http://dx.doi.org/10.21279/1454-864x-20-i1-033.
Full textChristensen, Chris. "Review of the 2013 Cryptologic History Symposium,Technological Change and Cryptology: Meeting the Historical Challenge." Cryptologia 38, no. 3 (June 13, 2014): 276–81. http://dx.doi.org/10.1080/01611194.2014.915682.
Full textAl-Kadit, Ibrahim A. "ORIGINS OF CRYPTOLOGY: THE ARAB CONTRIBUTIONS." Cryptologia 16, no. 2 (April 1992): 97–126. http://dx.doi.org/10.1080/0161-119291866801.
Full textLewand, Robert. "A Cryptology Course at Bletchley Park." Cryptologia 31, no. 2 (March 28, 2007): 108–11. http://dx.doi.org/10.1080/01611190601013582.
Full textKahn, David. "The Old Master of Austrian Cryptology." Cryptologia 31, no. 2 (March 28, 2007): 188–91. http://dx.doi.org/10.1080/01611190701216341.
Full textWeierud, Frode, and Sandy Zabell. "German mathematicians and cryptology in WWII." Cryptologia 44, no. 2 (June 6, 2019): 97–171. http://dx.doi.org/10.1080/01611194.2019.1600076.
Full textArai, Kenichi, and Hiroyuki Okazaki. "N-Dimensional Binary Vector Spaces." Formalized Mathematics 21, no. 2 (June 1, 2013): 75–81. http://dx.doi.org/10.2478/forma-2013-0008.
Full textBuck, R. Creighton. "Modern Cryptology: A Tutorial (Gilles Brassard)." SIAM Review 33, no. 3 (September 1991): 487–89. http://dx.doi.org/10.1137/1033116.
Full textKahn, David. "DAVID SHULMAN DIES – THE BIBLIOGRAPHER OF CRYPTOLOGY." Cryptologia 29, no. 1 (January 2005): 94–95. http://dx.doi.org/10.1080/0161-110591893816.
Full textLeary, Thomas (Penn). "CRYPTOLOGY IN THE 15th AND 16th CENTURY." Cryptologia 20, no. 3 (July 1996): 223–42. http://dx.doi.org/10.1080/0161-119691884924.
Full textWinkel, Brian. "Lessons Learned from a Mathematical Cryptology Course." Cryptologia 32, no. 1 (January 10, 2008): 45–55. http://dx.doi.org/10.1080/01611190701489732.
Full textChristensen, Chris, and Suzanne Gladfelter. "Taking a Cryptology Class to Bletchley Park." Cryptologia 32, no. 1 (January 10, 2008): 23–32. http://dx.doi.org/10.1080/01611190701548271.
Full textBoliver, David E. "Cryptology as College Outreach to Young Teens." Cryptologia 33, no. 2 (April 9, 2009): 158–65. http://dx.doi.org/10.1080/01611190802253359.
Full textChristensen, Chris. "Review of Two “Gift Books” about Cryptology." Cryptologia 34, no. 3 (June 30, 2010): 278–79. http://dx.doi.org/10.1080/01611191003598063.
Full textMenezes, Alfred. "Contemporary cryptology—The science of information integrity." Designs, Codes and Cryptography 4, no. 2 (April 1994): 193–95. http://dx.doi.org/10.1007/bf01578872.
Full textWinkel, Brian J. "ANNUAL GREG MELLEN MEMORIAL CRYPTOLOGY SCHOLARSHIP PRIZE." Cryptologia 24, no. 1 (January 2000): 1–3. http://dx.doi.org/10.1080/0161-110091888736.
Full textCraven, Matthew J., and John R. Woodward. "Evolution of group-theoretic cryptology attacks using hyper-heuristics." Journal of Mathematical Cryptology 16, no. 1 (October 26, 2021): 49–63. http://dx.doi.org/10.1515/jmc-2021-0017.
Full textBoyar, Joan, Philip Matthews, and René Peralta. "Logic Minimization Techniques with Applications to Cryptology." Journal of Cryptology 26, no. 2 (May 3, 2012): 280–312. http://dx.doi.org/10.1007/s00145-012-9124-7.
Full textSavard, John J. G., and Richard S. Pekelney. "THE ECM MARK II: DESIGN, HISTORY, AND CRYPTOLOGY." Cryptologia 23, no. 3 (July 1999): 211–28. http://dx.doi.org/10.1080/0161-119991887856.
Full textRatcliff, Rebecca A. "CRYPTOLOGY THROUGH THE CENTURIES: NSA'S 1999 HISTORY SYMPOSIUM." Cryptologia 24, no. 2 (January 2000): 160–67. http://dx.doi.org/10.1080/01611190008984240.
Full textMassey, James L. "Review of Series on Arabic Origins of Cryptology." Cryptologia 32, no. 3 (July 7, 2008): 280–83. http://dx.doi.org/10.1080/01611190802129104.
Full textSarkar, Palash. "On some connections between statistics and cryptology." Journal of Statistical Planning and Inference 148 (May 2014): 20–37. http://dx.doi.org/10.1016/j.jspi.2013.05.008.
Full textJara-Vera, Vicente, and Carmen Sánchez-Ávila. "Some Notes on a Formal Algebraic Structure of Cryptology." Mathematics 9, no. 18 (September 7, 2021): 2183. http://dx.doi.org/10.3390/math9182183.
Full textChristensen, Chris. "Announcement of the 2013 Cryptologic History Symposium “Technological Change and Cryptology: Meeting the Historical Challenges” 17–18 October 2013." Cryptologia 37, no. 2 (April 3, 2013): 105–6. http://dx.doi.org/10.1080/01611194.2013.767671.
Full textRatcliff, Rebecca. "CRYPTOLOGY AND WORLD WAR II: NSA'S 1995 HISTORY SYMPOSIUM." Cryptologia 20, no. 2 (April 1996): 135–40. http://dx.doi.org/10.1080/0161-119691884843.
Full textBeaver, Cheryl. "Cryptology in the Classroom: Analyzing a Zero-Knowledge Protocol." Cryptologia 33, no. 1 (January 27, 2009): 16–23. http://dx.doi.org/10.1080/01611190802550911.
Full textBonavoglia, Paolo. "Review of classical cryptology at play by Silvio Coccaro." Cryptologia 45, no. 1 (August 13, 2020): 94–96. http://dx.doi.org/10.1080/01611194.2020.1793824.
Full textRubin, Michael. "THE TELEGRAPH, ESPIONAGE, AND CRYPTOLOGY IN NINETEENTH CENTURY IRAN." Cryptologia 25, no. 1 (January 2001): 18–36. http://dx.doi.org/10.1080/0161-110191889752.
Full textLo, Chih-Yao. "The operation of the elliptic curve cryptology in IPv6." Journal of Discrete Mathematical Sciences and Cryptography 8, no. 3 (January 2005): 437–46. http://dx.doi.org/10.1080/09720529.2005.10698051.
Full textSchindler, John R. "A HOPELESS STRUGGLE: AUSTRO-HUNGARIAN CRYPTOLOGY DURING WORLD WAR I*." Cryptologia 24, no. 4 (January 2000): 339–50. http://dx.doi.org/10.1080/01611190008984251.
Full textChristensen, Chris, and Robert E. Lewand. "2008 Joint Mathematics Meetings Contributed Paper Session: Cryptology for Undergraduates." Cryptologia 31, no. 4 (October 8, 2007): 367. http://dx.doi.org/10.1080/01611190701582775.
Full text