Literatura académica sobre el tema "Advanced cryptographic techniques"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Advanced cryptographic techniques".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Advanced cryptographic techniques"
Abudalou, Mohammad. "Enhancing Data Security through Advanced Cryptographic Techniques". International Journal of Computer Science and Mobile Computing 13, n.º 1 (30 de enero de 2024): 88–92. http://dx.doi.org/10.47760/ijcsmc.2024.v13i01.007.
Texto completoKarantjias, Athanasios y Nineta Polemi. "Assessment of advanced cryptographic antiviral techniques". International Journal of Electronic Security and Digital Forensics 3, n.º 1 (2010): 60. http://dx.doi.org/10.1504/ijesdf.2010.032331.
Texto completoViresh, Kasheenath Babaleshwar, Karade Sinchana, N. Sakshi y Naidu Anush. "Audio encryption and decryption using AES algorithm technique". i-manager’s Journal on Electronics Engineering 14, n.º 2 (2024): 8. http://dx.doi.org/10.26634/jele.14.2.20486.
Texto completoLewis, Nehama, Yaron Connelly, Gil Henkin, Max Leibovich y Adi Akavia. "Factors Influencing the Adoption of Advanced Cryptographic Techniques for Data Protection of Patient Medical Records". Healthcare Informatics Research 28, n.º 2 (30 de abril de 2022): 132–42. http://dx.doi.org/10.4258/hir.2022.28.2.132.
Texto completoHieu, Phan Duong y Moti Yung. "PRIVACY IN ADVANCED CRYPTOGRAPHIC PROTOCOLS: PROTOTYPICAL EXAMPLES". Journal of Computer Science and Cybernetics 37, n.º 4 (12 de octubre de 2021): 429–51. http://dx.doi.org/10.15625/1813-9663/37/4/16104.
Texto completoMalhotra, Anoushka, Ashwin Arora y Dr Manjot Kaur Bhatia. "Symmetric Cryptographic Approaches". International Journal for Research in Applied Science and Engineering Technology 10, n.º 12 (31 de diciembre de 2022): 718–21. http://dx.doi.org/10.22214/ijraset.2022.47982.
Texto completoSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications". Mathematical Statistician and Engineering Applications 70, n.º 1 (31 de enero de 2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Texto completoMark Espalmado, John y Edwin Arboleda. "DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques". International Journal of Electrical and Computer Engineering (IJECE) 7, n.º 2 (1 de abril de 2017): 1032. http://dx.doi.org/10.11591/ijece.v7i2.pp1032-1041.
Texto completoFeilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense". Journal of Electrical Systems 19, n.º 4 (25 de enero de 2024): 227–40. http://dx.doi.org/10.52783/jes.635.
Texto completoParthasarathy, Rajamohan, Seow Soon Loong y Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques". Journal of Engineering & Technological Advances 3, n.º 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.
Texto completoTesis sobre el tema "Advanced cryptographic techniques"
Ibarrondo, Luis Alberto. "Privacy-preserving biometric recognition systems with advanced cryptographic techniques". Electronic Thesis or Diss., Sorbonne université, 2023. https://theses.hal.science/tel-04058954.
Texto completoDealing with highly sensitive data, identity management systems must provide adequate privacy protection as they leverage biometrics technology. Wielding Multi-Party Computation (MPC), Homomorphic Encryption (HE) and Functional Encryption (FE), this thesis tackles the design and implementation of practical privacy-preserving biometric systems, from the feature extraction to the matching with enrolled users. This work is consecrated to the design of secure biometric solutions for multiple scenarios, putting special care to balance accuracy and performance with the security guarantees, while improving upon existing works in the domain. We go beyond privacy preservation against semi-honest adversaries by also ensuring correctness facing malicious adversaries. Lastly, we address the leakage of biometric data when revealing the output, a privacy concern often overlooked in the literature. The main contributions of this thesis are: • A new face identification solution built on FE-based private inner product matching mitigating input leakage. • A novel efficient two-party computation protocol, Funshade, to preserve the privacy of biometric thresholded distance metric operations. • An innovative method to perform privacy-preserving biometric identification based on the notion of group testing named Grote. • A new distributed decryption protocol with collaborative masking addressing input leakage, dubbed Colmade. • An honest majority three-party computation protocol, Banners, to perform maliciously secure inference of Binarized Neural Networks. • A HE Python library named Pyfhel, offering a high-level abstraction and low-level functionalities, with applications in teaching
Escala, Ribas Alex. "Advanced cryptographic techniques for building verifiable and transparent electronic voting protocols". Doctoral thesis, Universitat Politècnica de Catalunya, 2017. http://hdl.handle.net/10803/457585.
Texto completoEls sistemes de vot electrònic presenten molts reptes a causa dels seus múltiples requeriments. Alguns d'aquests reptes estan relacionats amb garantir la privacitat del votant i la transparència del sistema, requisits que són difícils de satisfer al mateix temps. D'altra banda, els sistemes de vot electrònic presenten altres reptes com la usabilitat, sobretot de cara als votants. En aquesta tesi estudiem dos problemes del vot electrònic. La verificabilitat "cast-as-intended" tracta d'obtenir mecanismes que garanteixin al votant que el seu vot correspon a les seves preferències. Les propostes actuals posen la càrrega de la verificació en el votant, cosa que no és desitjable en eleccions del món real, on participen votants amb diferents graus de coneixements tècnics. Nosaltres introduïm el concepte de "universal cast-as-intended verifiability", que proporciona mecanismes per a que qualsevol entitat de l'elecció pugui comprovar que qualsevol vot conté les preferències del votant que l'ha emès - sense revelar el contingut del vot. A banda de definir formalment el concepte de "universal cast-as-intended verifiability" també proposem un protocol de vot electrònic que satisfà aquesta propietat. L'altre problema que hem estudiat és el problema dels vots invàlids en eleccions electròniques. Un dels avantatges del vot electrònic és que permet evitar que els votants emetin vots nuls sense voler. Per això, si durant el recompte de l'elecció apareixen vots nuls construïts intencionadament es pot crear desconfiança en el sistema de vot. Els usuaris del sistema de vot poden pensar que el sistema té forats de seguretat o que ha estat atacat. Per evitar aquesta situació, definim el concepte de "vote validatability", una propietat dels sistemes de vot electrònic que garanteix que els vots nuls es poden identificar en el moment que s'emeten. En aquesta tesi hem definit formalment aquesta propietat i hem dissenyat un protocol que la satisfà. Tots aquests requisits de seguretat dels protocols de vot electrònic s'implementen amb eines criptogràfiques. Les principals eines que s'utilitzen són esquemes de xifrat, esquemes de firma i proves de coneixement zero. Una prova de coneixement zero permet a una entitat convèncer una altra entitat que una sentència és certa sense donar cap altra informació que la certesa de la sentència. Aquestes proves de coneixement zero es poden fer servir, per exemple, per demostrar que el recompte de l'elecció s'ha fet correctament. Recentment, Groth i Sahai han construït proves de coneixement zero que es poden fer servir per un ampli ventall de sentències com per exemple sentències que apareixen en protocols de vot electrònic. En aquesta tesi hem fet dos contribucions sobre les proves de Groth i Sahai. Per una banda donem un marc teòric que permet derivar hipòtesis criptogràfiques per construir protocols criptogràfics. En particular, construïm noves proves de Groth i Sahai millorant l'eficiència de les construccions existents. De manera independent, indiquem com les proves de Groth i Sahai es poden estendre per fer-les compatibles amb un ventall més ampli de sentències, millorem l'eficiència de les proves de Groth i Sahai per moltes d'aquestes sentències i, en particular, quan es fan servir per demostrar múltiples sentències.
Hartung, Gunnar Richard [Verfasser] y J. [Akademischer Betreuer] Müller-Quade. "Advanced Cryptographic Techniques for Protecting Log Data / Gunnar Richard Hartung ; Betreuer: J. Müller-Quade". Karlsruhe : KIT-Bibliothek, 2020. http://d-nb.info/1206646683/34.
Texto completoSantiago, Pinazo Sonia. "Advanced Features in Protocol Verification: Theory, Properties, and Efficiency in Maude-NPA". Doctoral thesis, Universitat Politècnica de València, 2015. http://hdl.handle.net/10251/48527.
Texto completoSantiago Pinazo, S. (2015). Advanced Features in Protocol Verification: Theory, Properties, and Efficiency in Maude-NPA [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/48527
TESIS
Bozdemir, Beyza. "Privacy-preserving machine learning techniques". Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS323.
Texto completoMachine Learning as a Service (MLaaS) refers to a service that enables companies to delegate their machine learning tasks to single or multiple untrusted but powerful third parties, namely cloud servers. Thanks to MLaaS, the need for computational resources and domain expertise required to execute machine learning techniques is significantly reduced. Nevertheless, companies face increasing challenges with ensuring data privacy guarantees and compliance with the data protection regulations. Executing machine learning tasks over sensitive data requires the design of privacy-preserving protocols for machine learning techniques.In this thesis, we aim to design such protocols for MLaaS and study three machine learning techniques: Neural network classification, trajectory clustering, and data aggregation under privacy protection. In our solutions, our goal is to guarantee data privacy while keeping an acceptable level of performance and accuracy/quality evaluation when executing the privacy-preserving variants of these machine learning techniques. In order to ensure data privacy, we employ several advanced cryptographic techniques: Secure two-party computation, homomorphic encryption, homomorphic proxy re-encryption, multi-key homomorphic encryption, and threshold homomorphic encryption. We have implemented our privacy-preserving protocols and studied the trade-off between privacy, efficiency, and accuracy/quality evaluation for each of them
Capraro, Ivan. "Advanced Techniques in Free Space Quantum Communication". Doctoral thesis, Università degli studi di Padova, 2008. http://hdl.handle.net/11577/3425561.
Texto completoLibros sobre el tema "Advanced cryptographic techniques"
Swenson, Christopher. Modern cryptanalysis: Techniques for advanced code breaking. Indianapolis, IN: Wiley Pub., 2008.
Buscar texto completo1949-, Beth Thomas, Cot N. 1945- y Ingemarsson I. 1938-, eds. Advances in cryptology: Proceedings of EUROCRYPT 84, a Workshop on the Theory and Application of Cryptographic Techniques, Paris, France, April 9-11, 1984. Berlin: Springer-Verlag, 1985.
Buscar texto completoChristian, Cachin y Camenisch Jan, eds. Advances in cryptology: EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004 : proceedings. Berlin: Springer, 2004.
Buscar texto completoEUROCRYPT '94 (1994 Perugia, Italy). Advances in cryptology--EUROCRYPT-94: Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994 : proceedings. Berlin: Springer-Verlag, 1995.
Buscar texto completo1945-, Quisquater J. J. y Guillou Louis C. 1947-, eds. Advances in cryptology, EUROCRYPT '95: International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995 : proceedings. Berlin: Springer, 1995.
Buscar texto completoWatts, Davies Donald, ed. Advances in cryptology--EUROCRYPT '91: Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, April 8-11, 1991 : proceedings. Berlin: Springer-Verlag, 1991.
Buscar texto completoEUROCRYPT, '88 (1988 Davos Switzerland). Advances in cryptology--EUROCRYPT '88: Workshop on the Theory and Application of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988 : proceedings. Berlin: Springer-Verlag, 1988.
Buscar texto completoEUROCRYPT '92 (1992 Balatonfüred, Hungary). Advances in cryptology--EUROCRYPT '92: Workshop on the Theory and Application of Cryptographic Techniques, Balatonfüred, Hungary, May 24-28, 1992 : proceedings. Berlin: Springer-Verlag, 1993.
Buscar texto completoAUSCRYPT '92 (1992 Gold Coast, Queensland, Australia). Advances in cryptology-AUSCRYPT '92: Workshop on the theory and application of cryptographic techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, proceedings. Berlin: Springer-Verlag, 1993.
Buscar texto completoEUROCRYPT '96 (1996 Zaragoza, Spain). Advances in cryptology, EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996 : proceedings. Berlin: Springer, 1996.
Buscar texto completoCapítulos de libros sobre el tema "Advanced cryptographic techniques"
Kumar, J. Pradeep, P. Neelakanta Rao y Neeraja koppula. "Secure Data Sharing in Images Using Cryptographic Approach". En Advanced Techniques for IoT Applications, 356–64. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4435-1_34.
Texto completoGoh, Alwyn y David C. L. Ngo. "Computation of Cryptographic Keys from Face Biometrics". En Communications and Multimedia Security. Advanced Techniques for Network and Data Protection, 1–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45184-6_1.
Texto completoMohanta, Kshitish Kumar, Deena Sunil Sharanappa y Vishnu Narayan Mishra. "Enhancing the security of public key cryptographic model based on integrated ElGamal-Elliptic Curve Diffe Hellman (EG-ECDH) key exchange technique". En Advanced Mathematical Techniques in Computational and Intelligent Systems, 72–87. Boca Raton: CRC Press, 2023. http://dx.doi.org/10.1201/9781003460169-6.
Texto completoLenin Solomon, A. y Narendran Rajagopalan. "Performance Analysis of Various Cryptographic Techniques". En Advances in Automation, Signal Processing, Instrumentation, and Control, 1671–79. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8221-9_156.
Texto completoSrivastava, Ananya, Aboli Khare, Priyaranjan Satapathy y Ayes Chinmay. "Investigating Various Cryptographic Techniques Used in Cloud Computing". En Advances in Data Science and Management, 263–72. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0978-0_26.
Texto completoArun, V., D. Laxma Reddy y K. Nishanth Rao. "A Novel Analysis of Efficient Energy Architecture in Cryptography". En Advanced Techniques for IoT Applications, 339–45. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4435-1_32.
Texto completoBasavaiah, Jagadeesh, Audre Arlene Anthony y Chandrashekar Mohan Patil. "Visual Cryptography Using Hill Cipher and Advanced Hill Cipher Techniques". En Advances in VLSI, Signal Processing, Power Electronics, IoT, Communication and Embedded Systems, 429–43. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0443-0_34.
Texto completoSheikh, Shafiya Afzal y M. Tariq Banday. "Secure E-mail Communications Through Cryptographic Techniques—A Study". En Advances in Intelligent Systems and Computing, 219–35. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1275-9_19.
Texto completoFischer, Michael y Rebecca Wright. "An application of game theoretic techniques to cryptography". En Advances in Computational Complexity Theory, 99–118. Providence, Rhode Island: American Mathematical Society, 1993. http://dx.doi.org/10.1090/dimacs/013/06.
Texto completoSathya Priya, J., V. Krithikaa, S. Monika y P. Nivethini. "Ensuring Security in Sharing of Information Using Cryptographic Technique". En Advances in Intelligent Systems and Computing, 33–39. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2182-5_3.
Texto completoActas de conferencias sobre el tema "Advanced cryptographic techniques"
Ogiela, Marek R., Lidia Ogiela y Urszula Ogiela. "Cryptographic Techniques in Advanced Information Management". En 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). IEEE, 2014. http://dx.doi.org/10.1109/imis.2014.31.
Texto completoOo, Bo Bo y May Thu Aung. "Enhancing Secure Digital Communication Media Using Cryptographic Steganography Techniques". En 2020 International Conference on Advanced Information Technologies (ICAIT). IEEE, 2020. http://dx.doi.org/10.1109/icait51105.2020.9261790.
Texto completoOgiela, Lidia y Marek R. Ogiela. "Bio-Inspired Cryptographic Techniques in Information Management Applications". En 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2016. http://dx.doi.org/10.1109/aina.2016.161.
Texto completoMihaljevic, Miodrag, Hideki Imai, Michael David, Kazukuni Kobara y Hajime Watanabe. "On advanced cryptographic techniques for information security of smart grid AMI". En the Seventh Annual Workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2179298.2179371.
Texto completoFaz-Hernández, Armando y Julio López. "High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves". En Concurso de Teses e Dissertações. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/ctd.2023.230156.
Texto completoKumar, Vishal, Shafaque Ahmareen, Manoj Kumar, Yogendra Narayan Prajapati, Bhasker Pant y Sneha Bohra. "Enhancing OTP Generation Efficiency through Cryptographic Techniques". En 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). IEEE, 2023. http://dx.doi.org/10.1109/icacite57410.2023.10182488.
Texto completoPateriya, Pushpendra Kumar, Mritunjay Rai, Krishna Prasad Mukherjee y Gaurav Raj. "A Lightweight Cryptographic Algorithm using Trigonometric Technique". En 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE, 2018. http://dx.doi.org/10.1109/icacce.2018.8441670.
Texto completoSomaschi, Niccolo. "Semiconductor quantum dot based single-photon sources as resources for quantum communication and cryptography applications". En Advanced Photon Counting Techniques XVI, editado por Mark A. Itzler, K. Alex McIntosh y Joshua C. Bienfang. SPIE, 2022. http://dx.doi.org/10.1117/12.2618464.
Texto completoHill, Alexander D., Bradley Christensen y Paul G. Kwiat. "Advanced techniques for free-space optical quantum cryptography over water". En SPIE LASE, editado por Hamid Hemmati y Don M. Boroson. SPIE, 2016. http://dx.doi.org/10.1117/12.2218270.
Texto completoVaibhavi, Aher y Kulkarni Samidha. "Cryptography Technique for Data Hiding Application". En 2016 Sixth International Conference on Advanced Computing & Communication Technologies. Singapore: Research Publishing Services, 2016. http://dx.doi.org/10.3850/978-981-11-0783-2_420.
Texto completo