Literatura académica sobre el tema "Cryptography"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Cryptography".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Cryptography"
Yan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)". Journal of Physics: Conference Series 2386, n.º 1 (1 de diciembre de 2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Texto completoGoldreich, Oded. "Cryptography and cryptographic protocols". Distributed Computing 16, n.º 2-3 (1 de septiembre de 2003): 177–99. http://dx.doi.org/10.1007/s00446-002-0077-1.
Texto completoAnilkumar, Chunduru, Bhavani Gorle y Kinthali Sowmya. "A Secure Method of Communication in Conventional Cryptography using Quantum Key Distribution". Applied and Computational Engineering 8, n.º 1 (1 de agosto de 2023): 68–73. http://dx.doi.org/10.54254/2755-2721/8/20230083.
Texto completoRusetskaya, Irina A. "CRYPTOGRAPHY. FROM THE PAST TO THE FUTURE". RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, n.º 4 (2021): 47–57. http://dx.doi.org/10.28995/2686-679x-2021-4-47-57.
Texto completoGoyal, Rohit. "Quantum Cryptography: Secure Communication Beyond Classical Limits". Journal of Quantum Science and Technology 1, n.º 1 (31 de marzo de 2024): 1–5. http://dx.doi.org/10.36676/jqst.v1.i1.01.
Texto completoVictor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat y Abdullayeva Shakhzoda. "Cryptography: Advances in Secure Communication and Data Protection". E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.
Texto completoAnilkumar, Chunduru, Swathi Lenka, N. Neelima y Sathishkumar V E. "A Secure Method of Communication Through BB84 Protocol in Quantum Key Distribution". Scalable Computing: Practice and Experience 25, n.º 1 (4 de enero de 2024): 21–33. http://dx.doi.org/10.12694/scpe.v25i1.2152.
Texto completoWANG, XINGYUAN, MING LIU y NINI GU. "TWO NEW CHAOTIC CRYPTOGRAPHIES BASED ON DIFFERENT ATTRACTOR-PARTITION ALGORITHMS". International Journal of Modern Physics B 21, n.º 27 (30 de octubre de 2007): 4739–50. http://dx.doi.org/10.1142/s0217979207038071.
Texto completoShashi Raj K. "The Intersection of Algebra and Cryptography: Enhancing Information Security through Mathematical Foundations". Communications on Applied Nonlinear Analysis 31, n.º 4s (5 de julio de 2024): 466–89. http://dx.doi.org/10.52783/cana.v31.943.
Texto completoYadav, Sonam. "An Extensive Study on Lattice-Based Cryptography and its Applications for RLWE-Based Problems". Universal Research Reports 10, n.º 3 (2023): 104–10. http://dx.doi.org/10.36676/urr.2023-v10i3-014.
Texto completoTesis sobre el tema "Cryptography"
Poschmann, Axel York. "Lightweight cryptography cryptographic engineering for a pervasive world". Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2009. http://d-nb.info/996578153/04.
Texto completoAlmeida, Braga Daniel de. "Cryptography in the wild : the security of cryptographic implementations". Thesis, Rennes 1, 2022. http://www.theses.fr/2022REN1S067.
Texto completoSide-channel attacks are daunting for cryptographic implementations. Despite past attacks, and the proliferation of verification tools, these attacks still affect many implementations. In this manuscript, we address two aspects of this problem, centered around attack and defense. We unveil several microarchitectural side-channel attacks on implementations of PAKE protocols. In particular, we exposed attacks on Dragonfly, used in the new Wi-Fi standard WPA3, and SRP, deployed in many software such as ProtonMail or Apple HomeKit. We also explored the lack of use by developers of tools to detect such attacks. We questioned developers from various cryptographic projects to identify the origin of this lack. From their answers, we issued recommendations. Finally, in order to stop the spiral of attack-patch on Dragonfly implementations, we provide a formally verified implementation of the cryptographic layer of the protocol, whose execution is secret-independent
Yerushalmi, Yoav. "Incremental cryptography". Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42789.
Texto completoIncludes bibliographical references (leaves 147-148).
by Yoav Yerushalmi.
M.Eng.
Shamonin, K. E. "Quantum cryptography". Thesis, Sumy State University, 2018. http://essuir.sumdu.edu.ua/handle/123456789/66837.
Texto completoLopez, Samuel. "MODERN CRYPTOGRAPHY". CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/729.
Texto completoMinaud, Brice. "Analyse de primitives cryptographiques récentes". Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1S066/document.
Texto completoIn this thesis, we study the security of some recent cryptographic primitives, both symmetric and asymmetric. Along the way we also consider white-box primitives, which may be regarded as a middle ground between symmetric and asymmetric cryptography. We begin by showing the existence of non-trivial linear maps commuting with the round function of some recent block cipher designs, which give rise to self-similarity and invariant subspace attacks. We then move on to the structural cryptanalysis of ASASA schemes, where nonlinear layers S alternate with affine layers A. Our structural cryptanalysis applies to symmetric, multivariate, as well as white-box instances. Focusing on the white-box model of incompressibility, we then build an efficient block cipher and key generator that offer provable security guarantees. Finally, on the purely asymmetric side, we describe a polynomial attack against a recent multilinear map proposal
PRIYADHARSHINI, THIRUTHUVADOSS ANGELINE. "Comparison and Performance Evaluation of Modern Cryptography and DNA Cryptography". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-120103.
Texto completoNyman, Ellinor. "Cryptography : A study of modern cryptography and its mathematical methods". Thesis, Uppsala universitet, Analys och sannolikhetsteori, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-447460.
Texto completoIdrees, Zunera. "Elliptic Curves Cryptography". Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17544.
Texto completoRoe, Michael Robert. "Cryptography and evidence". Thesis, University of Cambridge, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.627396.
Texto completoLibros sobre el tema "Cryptography"
Stinson, Douglas R. y Maura B. Paterson. Cryptography. Fourth edition. | Boca Raton : CRC Press, Taylor & Francis: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9781315282497.
Texto completoRubinstein-Salzedo, Simon. Cryptography. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94818-8.
Texto completoSlayton, Rebecca, ed. Democratizing Cryptography. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3549993.
Texto completoFranklin, Matthew, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48390-x.
Texto completoOmondi, Amos R. Cryptography Arithmetic. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-34142-8.
Texto completoEasttom, William. Modern Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63115-4.
Texto completoHirschfeld, Rafael, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-63594-7.
Texto completoHirchfeld, Rafael, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0055468.
Texto completoFerguson, Niels, Bruce Schneier y Tadayoshi Kohno. Cryptography Engineering. Indianapolis, Indiana: Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781118722367.
Texto completoBlaze, Matt, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36504-4.
Texto completoCapítulos de libros sobre el tema "Cryptography"
Hofheinz, Dennis y Eike Kiltz. "Scalable Cryptography". En Lecture Notes in Computer Science, 169–78. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-21534-6_9.
Texto completoBuchmann, Johannes. "Sustainable Cryptography". En International Symposium on Mathematics, Quantum Theory, and Cryptography, 3. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5191-8_1.
Texto completoHardy, Yorick y Willi-Hans Steeb. "Cryptography". En Classical and Quantum Computing, 215–28. Basel: Birkhäuser Basel, 2001. http://dx.doi.org/10.1007/978-3-0348-8366-5_11.
Texto completoWallis, W. D. "Cryptography". En Mathematics in the Real World, 157–67. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-8529-2_11.
Texto completoO’Regan, Gerard. "Cryptography". En Texts in Computer Science, 155–70. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44561-8_10.
Texto completoKoblitz, Neal. "Cryptography". En Mathematics Unlimited — 2001 and Beyond, 749–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/978-3-642-56478-9_38.
Texto completoKizza, Joseph Migga. "Cryptography". En Guide to Computer Network Security, 225–48. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_11.
Texto completoCorsini, Piergiulio y Violeta Leoreanu. "Cryptography". En Applications of Hyperstructure Theory, 247–56. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4757-3714-1_8.
Texto completoHansmann, Uwe, Martin S. Nicklous, Thomas Schäck y Frank Seliger. "Cryptography". En Smart Card Application Development Using Java, 49–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-642-98052-7_4.
Texto completoNorberg, Scott. "Cryptography". En Advanced ASP.NET Core 3 Security, 57–101. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6014-2_3.
Texto completoActas de conferencias sobre el tema "Cryptography"
Jovanović, Boriša, Ivan Tot y Silvana Ilić. "Contemporary cryptography: Recent achievement and research perspectives". En 11th International Scientific Conference on Defensive Technologies - OTEX 2024, 376–80. Military Technical Institute, Belgrade, 2024. http://dx.doi.org/10.5937/oteh24067j.
Texto completoSlutsky, Boris A., R. Rao, L. Tancevski, P. C. Sun y Y. Fainman. "Information Leakage Estimates in Quantum Cryptography". En Optics in Computing. Washington, D.C.: Optica Publishing Group, 1997. http://dx.doi.org/10.1364/oc.1997.owc.2.
Texto completoFaz-Hernández, Armando y Julio López. "High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves". En Concurso de Teses e Dissertações. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/ctd.2023.230156.
Texto completoFaz-Hernandez, Armando y Julio López. "High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves". En Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais, 49–56. Sociedade Brasileira de Computação - SBC, 2024. http://dx.doi.org/10.5753/sbseg_estendido.2024.241959.
Texto completoDuta, Cristinaloredana y Laura Gheorghe. "ELEARNING FRAMEWORK FOR UNDERSTANDING CRYPTOGRAPHY AT ALL LEVELS". En eLSE 2015. Carol I National Defence University Publishing House, 2015. http://dx.doi.org/10.12753/2066-026x-15-026.
Texto completoЛацин, Семен Михайлович y Наталья Александровна Борсук. "ANALYSIS OF ELLIPTICAL CRYPTOGRAPHY ON THE EXAMPLE OF THE BITCOIN BLOCKCHAIN". En Методики фундаментальных и прикладных научных исследований: сборник статей всероссийской научной конференции (Санкт-Петербург, Декабрь 2022). Crossref, 2023. http://dx.doi.org/10.37539/221223.2022.83.11.008.
Texto completoBraga, Alexandre y Ricardo Dahab. "A Longitudinal and Retrospective Study on How Developers Misuse Cryptography in Online Communities". En Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/sbseg.2017.19488.
Texto completoRodrigues, Gustavo Eloi de P., Alexandre M. Braga y Ricardo Dahab. "A machine learning approach to detect misuse of cryptographic APIs in source code". En Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19223.
Texto completoStanojlović Mirković, Milena, Miljana Milić y Dejan Mirković. "Design and Simulations of cryptography block using the custom Library of Cells Resistant to Side Channel Attacks". En International Conference IcETRAN, 67–70. ETRAN Society, Academic Mind, Belgrade, 2024. https://doi.org/10.69994/11ic24011.
Texto completo"Medical Image Security Using Quantum Cryptography". En InSITE 2018: Informing Science + IT Education Conferences: La Verne California. Informing Science Institute, 2018. http://dx.doi.org/10.28945/3968.
Texto completoInformes sobre el tema "Cryptography"
Nechvatal, James. Public-key cryptography. Gaithersburg, MD: National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.sp.800-2.
Texto completode Abreu, Jonas y Mariana Cunha e Melo. Extending Pix: An approach to offline Dynamic QR Code generation. Center for Technology and Public Interest, SL, abril de 2023. http://dx.doi.org/10.59262/9qu6ex.
Texto completoMouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, julio de 2021. http://dx.doi.org/10.6028/nist.ir.8319.
Texto completoJonsson, J. y B. Kaliski. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. RFC Editor, febrero de 2003. http://dx.doi.org/10.17487/rfc3447.
Texto completoBlake-Wilson, S., D. Brown y P. Lambert. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). RFC Editor, abril de 2002. http://dx.doi.org/10.17487/rfc3278.
Texto completoTurner, S. y D. Brown. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). RFC Editor, enero de 2010. http://dx.doi.org/10.17487/rfc5753.
Texto completoDraelos, Timothy John, Mark Dolan Torgerson, William Douglas Neumann, Donald R. Gallup, Michael Joseph Collins y Cheryl Lynn Beaver. Hybrid cryptography key management. Office of Scientific and Technical Information (OSTI), noviembre de 2003. http://dx.doi.org/10.2172/918318.
Texto completoMcKay, Kerry A., Larry Bassham, Meltem Sonmez Turan y Nicky Mouha. Report on lightweight cryptography. Gaithersburg, MD: National Institute of Standards and Technology, marzo de 2017. http://dx.doi.org/10.6028/nist.ir.8114.
Texto completoTorgerson, Mark Dolan, Timothy John Draelos, Richard Crabtree Schroeppel, Russell D. Miller y William Erik Anderson. Small circuits for cryptography. Office of Scientific and Technical Information (OSTI), octubre de 2005. http://dx.doi.org/10.2172/875977.
Texto completoMcGrew, D., K. Igoe y M. Salter. Fundamental Elliptic Curve Cryptography Algorithms. RFC Editor, febrero de 2011. http://dx.doi.org/10.17487/rfc6090.
Texto completo