Artículos de revistas sobre el tema "CRYPTOGRAPHI"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "CRYPTOGRAPHI".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
WANG, XINGYUAN, MING LIU y NINI GU. "TWO NEW CHAOTIC CRYPTOGRAPHIES BASED ON DIFFERENT ATTRACTOR-PARTITION ALGORITHMS". International Journal of Modern Physics B 21, n.º 27 (30 de octubre de 2007): 4739–50. http://dx.doi.org/10.1142/s0217979207038071.
Texto completoYan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)". Journal of Physics: Conference Series 2386, n.º 1 (1 de diciembre de 2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Texto completoGoldreich, Oded. "Cryptography and cryptographic protocols". Distributed Computing 16, n.º 2-3 (1 de septiembre de 2003): 177–99. http://dx.doi.org/10.1007/s00446-002-0077-1.
Texto completoBAFTIU, Naim. "Analysis and use of Cryptography techniques in programming language C#: Coding and Decoding". PRIZREN SOCIAL SCIENCE JOURNAL 4, n.º 3 (31 de diciembre de 2020): 1–10. http://dx.doi.org/10.32936/pssj.v4i3.165.
Texto completo., Abhishek Misal y Tin Mar Kyi . "Virtual Cryptopgraphic Technique and Bit-plane Segmentation Stegnegography for Security in Bioinformatics and Biomedical Applications". CSVTU International Journal of Biotechnology Bioinformatics and Biomedical 4, n.º 2 (3 de septiembre de 2019): 59–66. http://dx.doi.org/10.30732/ijbbb.20190402005.
Texto completoAnilkumar, Chunduru, Bhavani Gorle y Kinthali Sowmya. "A Secure Method of Communication in Conventional Cryptography using Quantum Key Distribution". Applied and Computational Engineering 8, n.º 1 (1 de agosto de 2023): 68–73. http://dx.doi.org/10.54254/2755-2721/8/20230083.
Texto completoPaul, Sebastian y Melanie Niethammer. "On the importance of cryptographic agility for industrial automation". at - Automatisierungstechnik 67, n.º 5 (27 de mayo de 2019): 402–16. http://dx.doi.org/10.1515/auto-2019-0019.
Texto completoVictor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat y Abdullayeva Shakhzoda. "Cryptography: Advances in Secure Communication and Data Protection". E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.
Texto completoRusetskaya, Irina A. "CRYPTOGRAPHY. FROM THE PAST TO THE FUTURE". RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, n.º 4 (2021): 47–57. http://dx.doi.org/10.28995/2686-679x-2021-4-47-57.
Texto completoSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications". Mathematical Statistician and Engineering Applications 70, n.º 1 (31 de enero de 2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Texto completoDarko, Cyprian Danso. "Data Security in the Cloud Using Multi-Modal Bio-Cryptographic Authentication". Advances in Multidisciplinary and scientific Research Journal Publication 10, n.º 4 (30 de noviembre de 2022): 9–14. http://dx.doi.org/10.22624/aims/digital/v10n4p2.
Texto completoLiu, Lingfeng, Hongyue Xiang, Renzhi Li y Hanping Hu. "The Eigenvalue Complexity of Sequences in the Real Domain". Entropy 21, n.º 12 (5 de diciembre de 2019): 1194. http://dx.doi.org/10.3390/e21121194.
Texto completoIrawan, Muhammad Dedi. "IMPLEMENTASI KRIPTOGRAFI VIGENERE CIPHER DENGAN PHP". JURNAL TEKNOLOGI INFORMASI 1, n.º 1 (1 de junio de 2017): 11. http://dx.doi.org/10.36294/jurti.v1i1.21.
Texto completoAkram, Zaryab. "Cryptology Based on Laplace Transform of Hyperbolic Function and Matrix Decomposition Method". ECS Meeting Abstracts MA2022-02, n.º 64 (9 de octubre de 2022): 2364. http://dx.doi.org/10.1149/ma2022-02642364mtgabs.
Texto completoVanjara, Pratik A. y Dr Kishor Atkotiya. "An Investigation Into the Field of Cryptography and Cryptographic Algorithm Protocols". Paripex - Indian Journal Of Research 2, n.º 2 (15 de enero de 2012): 58–60. http://dx.doi.org/10.15373/22501991/feb2013/19.
Texto completoHammad, Baraa Tareq, Ali Maki Sagheer, Ismail Taha Ahmed y Norziana Jamil. "A comparative review on symmetric and asymmetric DNA-based cryptography". Bulletin of Electrical Engineering and Informatics 9, n.º 6 (1 de diciembre de 2020): 2484–91. http://dx.doi.org/10.11591/eei.v9i6.2470.
Texto completoChochtoula, Despoina, Aristidis Ilias, Yannis C. Stamatiou y Christos Makris. "Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol". Future Internet 14, n.º 8 (28 de julio de 2022): 232. http://dx.doi.org/10.3390/fi14080232.
Texto completoGil Molk, Ali Mohammad Norouzzadeh, Mohammad Reza Aref y Reza Ramazani Khorshiddoust. "Analysis of design goals of cryptography algorithms based on different components". Indonesian Journal of Electrical Engineering and Computer Science 23, n.º 1 (1 de julio de 2021): 540. http://dx.doi.org/10.11591/ijeecs.v23.i1.pp540-548.
Texto completoHafiz Nanda Ginting, Subhan, Muhammad Rhifky Wayahdi y Surya Guntur. "Playfair Cipher Algorithm in Learning Media". Jurnal Minfo Polgan 11, n.º 1 (5 de marzo de 2022): 9–14. http://dx.doi.org/10.33395/jmp.v11i1.11560.
Texto completoDas, Jyotirmoy, Sangeeta Kakoty y Majidul Ahmed. "A Study on Modern Cryptographic Primitives and Signature Schemes". IRA-International Journal of Technology & Engineering (ISSN 2455-4480) 5, n.º 3 (27 de diciembre de 2016): 70. http://dx.doi.org/10.21013/jte.v5.n3.p3.
Texto completoB S, Aditya y Sharadadevi Kaganurmath. "Use of Cryptography and Signing for Network Security". International Journal for Research in Applied Science and Engineering Technology 10, n.º 7 (31 de julio de 2022): 4080–83. http://dx.doi.org/10.22214/ijraset.2022.45926.
Texto completoSabaya, Dinaeli Paul, Adam Aloyce Semlambo y Joel Kazoba Simon. "Data Security Through Crypto-Stegano Systems". International Journal of Computational Science, Information Technology and Control Engineering 10, n.º 1/2/3 (27 de julio de 2023): 1–23. http://dx.doi.org/10.5121/ijcsitce.2023.10301.
Texto completoEt. al., Mandru Manisha,. "Colour Visual Cryptography (3,3) Scheme". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n.º 2 (10 de abril de 2021): 3189–98. http://dx.doi.org/10.17762/turcomat.v12i2.2374.
Texto completoDanoyan, D. H. "EXTENDING WHITE-BOX CRYPTOGRAPHY BASED OBLIVIOUS TRANSFER PROTOCOL". Proceedings of the YSU A: Physical and Mathematical Sciences 50, n.º 1 (239) (18 de marzo de 2016): 40–44. http://dx.doi.org/10.46991/psyu:a/2016.50.1.040.
Texto completoZHANG, YU. "The computational SLR: a logic for reasoning about computational indistinguishability". Mathematical Structures in Computer Science 20, n.º 5 (octubre de 2010): 951–75. http://dx.doi.org/10.1017/s0960129510000265.
Texto completoIppolitova, Aleksandra. "The Functions of the Cryptography in the Olonets Codex of Incantations of 17th Сentury. 1. Systematization of Data". Slavianovedenie, n.º 6 (2022): 38. http://dx.doi.org/10.31857/s0869544x0023260-9.
Texto completoTeja, Penumantra Satya Sai, Mounika Lakshmi P y Vinay Kumar K. "A Secure Communication through Quantum Key Distribution Protocols". International Research Journal of Electronics and Computer Engineering 4, n.º 3 (30 de septiembre de 2018): 14. http://dx.doi.org/10.24178/irjece.2018.4.3.14.
Texto completoXiao, Dianyan y Yang Yu. "Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption". Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/4957045.
Texto completoHulian, A. D. y R. V. Karpenko. "TRANSFER THAT ARE NEEDERS FOR CRYSTOVAL AS INVESTMENT UNION SPECULATIVE ASSET". Actual problems of native jurisprudence, n.º 05 (5 de diciembre de 2019): 60–65. http://dx.doi.org/10.15421/391958.
Texto completoDuka, Mariusz. "ELLIPTIC-CURVE CRYPTOGRAPHY (ECC) AND ARGON2 ALGORITHM IN PHP USING OPENSSL AND SODIUM LIBRARIES". Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 10, n.º 3 (30 de septiembre de 2020): 91–94. http://dx.doi.org/10.35784/iapgos.897.
Texto completoMakeri, Yakubu Ajiji. "INTEGRATED CRYPTOGRAPHICAL ACCESS CONTROL OVER NETWORK PROJECT". Acta Informatica Malaysia 4, n.º 1 (18 de mayo de 2020): 19–21. http://dx.doi.org/10.26480/aim.01.2020.19.21.
Texto completoGeetha, M. y K. Akila. "SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS". IJISCS (International Journal of Information System and Computer Science) 2, n.º 3 (14 de marzo de 2019): 123. http://dx.doi.org/10.56327/ijiscs.v2i3.708.
Texto completoKlyucharev, Petr. "CELLULAR AUTOMATA AND THEIR GENERALIZATIONS IN CRYPTOGRAPHY. PART 2." Voprosy kiberbezopasnosti, n.º 1(47) (2022): 37–48. http://dx.doi.org/10.21681/2311-3456-2022-1-37-48.
Texto completoAbhishek, Kunal y E. George Dharma Prakash Raj. "Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography". Cybernetics and Information Technologies 21, n.º 2 (1 de junio de 2021): 70–88. http://dx.doi.org/10.2478/cait-2021-0020.
Texto completoKaushal, Milind. "Cryptography: A Brief Review". International Journal for Research in Applied Science and Engineering Technology 10, n.º 2 (28 de febrero de 2022): 763–67. http://dx.doi.org/10.22214/ijraset.2022.40401.
Texto completoNana, Nana y Puguh Wahyu Prasetyo. "An implementation of Hill cipher and 3x3x3 rubik's cube to enhance communication security". Bulletin of Applied Mathematics and Mathematics Education 1, n.º 2 (10 de diciembre de 2021): 75–92. http://dx.doi.org/10.12928/bamme.v1i2.4252.
Texto completoOkhrimenko, Tetiana, Serhii Dorozhynskyi y Bohdan Horbakha. "ANALYSIS OF QUANTUM SECURE DIRECT COMMUNICATION PROTOCOLS". Computer systems and information technologies, n.º 1 (30 de marzo de 2023): 62–67. http://dx.doi.org/10.31891/csit-2023-1-8.
Texto completoNişancı, Görkem, Paul G. Flikkema y Tolga Yalçın. "Symmetric Cryptography on RISC-V: Performance Evaluation of Standardized Algorithms". Cryptography 6, n.º 3 (10 de agosto de 2022): 41. http://dx.doi.org/10.3390/cryptography6030041.
Texto completoChiou, Shin-Yan. "Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions". BioMed Research International 2013 (2013): 1–12. http://dx.doi.org/10.1155/2013/623815.
Texto completoLada, Nataliia y Yuliia Rudnytska. "IMPLEMENTATION OF A METHOD FOR SYNTHESIZING GROUPS OF SYMMETRIC DOUBLE-OPERAND OPERATIONS OF CRYPTOGRAPHIC INFORMATION CODING FOR BLOCK ENCRYPTION SYSTEMS". Innovative Technologies and Scientific Solutions for Industries, n.º 2 (20) (30 de junio de 2022): 35–43. http://dx.doi.org/10.30837/itssi.2022.20.035.
Texto completoKlyucharev, Petr. "Cellular Automata and Their Generalizations in Cryptography. Part 1". Voprosy kiberbezopasnosti, n.º 6(46) (2021): 90–101. http://dx.doi.org/10.21681/2311-3456-2021-6-90-101.
Texto completoWang, Xing, Qiang Zhang y Xiao Peng Wei. "A New Encryption Method Based on Rijndael Algorithm and DNA Computing". Applied Mechanics and Materials 20-23 (enero de 2010): 1241–46. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1241.
Texto completoBarthe, Gilles. "High-Assurance Cryptography: Cryptographic Software We Can Trust". IEEE Security & Privacy 13, n.º 5 (septiembre de 2015): 86–89. http://dx.doi.org/10.1109/msp.2015.112.
Texto completoOctora Ginting, Ferraro S., Veithzal Rivai Zainal y Aziz Hakim. "Digital Signature Standard Implementation Strategy by Optimizing Hash Functions Through Performance Optimization". Journal of Accounting and Finance Management 3, n.º 6 (19 de febrero de 2023): 362–71. http://dx.doi.org/10.38035/jafm.v3i6.175.
Texto completoKlimushyn, Petro, Tetiana Solianyk, Oleksandr Mozhaev, Vitalii Nosov, Tetiana Kolisnyk y Vasily Yanov. "HARDWARE SUPPORT PROCEDURES FOR ASYMMETRIC AUTHENTICATION OF THE INTERNET OF THINGS". Innovative Technologies and Scientific Solutions for Industries, n.º 4 (18) (10 de diciembre de 2021): 31–39. http://dx.doi.org/10.30837/itssi.2021.18.031.
Texto completoZill, E. Huma, Ul Rahman Jamshaid, Suleman Muhammad y Anjum Naveed. "Cryptographic method based on natural-elzaki transform". i-manager’s Journal on Mathematics 11, n.º 1 (2022): 39. http://dx.doi.org/10.26634/jmat.11.1.18511.
Texto completoPriya, R. Shanmuga y A. Senthilkumar. "A Study on Visual Cryptography for Colour Images". International Journal of Advanced Research in Computer Science and Software Engineering 7, n.º 7 (1 de agosto de 2017): 260. http://dx.doi.org/10.23956/ijarcsse/v7i7/0172.
Texto completoDanger, Jean-Luc, Youssef El Housni, Adrien Facon, Cheikh Gueye, Sylvain Guilley, Sylvie Herbel, Ousmane Ndiaye, Edoardo Persichetti y Alexander Schaub. "On the Performance and Security of Multiplication in GF(2N)". Cryptography 2, n.º 3 (18 de septiembre de 2018): 25. http://dx.doi.org/10.3390/cryptography2030025.
Texto completoCambou, Bertrand, Michael Gowanlock, Bahattin Yildiz, Dina Ghanaimiandoab, Kaitlyn Lee, Stefan Nelson, Christopher Philabaum, Alyssa Stenberg y Jordan Wright. "Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions". Applied Sciences 11, n.º 6 (21 de marzo de 2021): 2801. http://dx.doi.org/10.3390/app11062801.
Texto completoBanu, Anees. "Improved Algorithm of Steganography Combined with Cryptography". International Journal for Research in Applied Science and Engineering Technology 9, n.º VI (30 de junio de 2021): 3793–804. http://dx.doi.org/10.22214/ijraset.2021.35792.
Texto completo