Artículos de revistas sobre el tema "Cryptography"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Cryptography".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Yan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)". Journal of Physics: Conference Series 2386, n.º 1 (1 de diciembre de 2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Texto completoGoldreich, Oded. "Cryptography and cryptographic protocols". Distributed Computing 16, n.º 2-3 (1 de septiembre de 2003): 177–99. http://dx.doi.org/10.1007/s00446-002-0077-1.
Texto completoAnilkumar, Chunduru, Bhavani Gorle y Kinthali Sowmya. "A Secure Method of Communication in Conventional Cryptography using Quantum Key Distribution". Applied and Computational Engineering 8, n.º 1 (1 de agosto de 2023): 68–73. http://dx.doi.org/10.54254/2755-2721/8/20230083.
Texto completoRusetskaya, Irina A. "CRYPTOGRAPHY. FROM THE PAST TO THE FUTURE". RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, n.º 4 (2021): 47–57. http://dx.doi.org/10.28995/2686-679x-2021-4-47-57.
Texto completoVictor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat y Abdullayeva Shakhzoda. "Cryptography: Advances in Secure Communication and Data Protection". E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.
Texto completoAnilkumar, Chunduru, Swathi Lenka, N. Neelima y Sathishkumar V E. "A Secure Method of Communication Through BB84 Protocol in Quantum Key Distribution". Scalable Computing: Practice and Experience 25, n.º 1 (4 de enero de 2024): 21–33. http://dx.doi.org/10.12694/scpe.v25i1.2152.
Texto completoWANG, XINGYUAN, MING LIU y NINI GU. "TWO NEW CHAOTIC CRYPTOGRAPHIES BASED ON DIFFERENT ATTRACTOR-PARTITION ALGORITHMS". International Journal of Modern Physics B 21, n.º 27 (30 de octubre de 2007): 4739–50. http://dx.doi.org/10.1142/s0217979207038071.
Texto completoShashi Raj K. "The Intersection of Algebra and Cryptography: Enhancing Information Security through Mathematical Foundations". Communications on Applied Nonlinear Analysis 31, n.º 4s (5 de julio de 2024): 466–89. http://dx.doi.org/10.52783/cana.v31.943.
Texto completoYadav, Sonam. "An Extensive Study on Lattice-Based Cryptography and its Applications for RLWE-Based Problems". Universal Research Reports 10, n.º 3 (2023): 104–10. http://dx.doi.org/10.36676/urr.2023-v10i3-014.
Texto completoOh, Chaerin, Woosang Im, Hyunil Kim y Changho Seo. "Recent Trends in Cryptanalysis Techniques for White-box Block Ciphers". Korean Institute of Smart Media 12, n.º 9 (30 de octubre de 2023): 9–18. http://dx.doi.org/10.30693/smj.2023.12.9.9.
Texto completoBAFTIU, Naim. "Analysis and use of Cryptography techniques in programming language C#: Coding and Decoding". PRIZREN SOCIAL SCIENCE JOURNAL 4, n.º 3 (31 de diciembre de 2020): 1–10. http://dx.doi.org/10.32936/pssj.v4i3.165.
Texto completoHammad, Baraa Tareq, Ali Maki Sagheer, Ismail Taha Ahmed y Norziana Jamil. "A comparative review on symmetric and asymmetric DNA-based cryptography". Bulletin of Electrical Engineering and Informatics 9, n.º 6 (1 de diciembre de 2020): 2484–91. http://dx.doi.org/10.11591/eei.v9i6.2470.
Texto completoKumar,, Varun. "Challenges and Future Trends of Cryptography in Internet of Things". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 04 (10 de abril de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30505.
Texto completoEt. al., Mandru Manisha,. "Colour Visual Cryptography (3,3) Scheme". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n.º 2 (10 de abril de 2021): 3189–98. http://dx.doi.org/10.17762/turcomat.v12i2.2374.
Texto completoTeja, Penumantra Satya Sai, Mounika Lakshmi P y Vinay Kumar K. "A Secure Communication through Quantum Key Distribution Protocols". International Research Journal of Electronics and Computer Engineering 4, n.º 3 (30 de septiembre de 2018): 14. http://dx.doi.org/10.24178/irjece.2018.4.3.14.
Texto completoSabani, Maria E., Ilias K. Savvas y Georgia Garani. "Learning with Errors: A Lattice-Based Keystone of Post-Quantum Cryptography". Signals 5, n.º 2 (13 de abril de 2024): 216–43. http://dx.doi.org/10.3390/signals5020012.
Texto completoDabola, Shashank. "Chat Secure-Messaging Application Based on Secure Encryption Algorithm". International Journal for Research in Applied Science and Engineering Technology 12, n.º 3 (31 de marzo de 2024): 303–5. http://dx.doi.org/10.22214/ijraset.2024.58817.
Texto completoSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications". Mathematical Statistician and Engineering Applications 70, n.º 1 (31 de enero de 2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Texto completoDubey, Praveer y Ompal Yadav. "A Survey on Quantum cryptography versus classical Cryptography". International Journal of Current Engineering and Technology 10, n.º 06 (31 de octubre de 2021): 910–13. http://dx.doi.org/10.14741/ijcet/v.10.6.3.
Texto completoAkram, Zaryab. "Cryptology Based on Laplace Transform of Hyperbolic Function and Matrix Decomposition Method". ECS Meeting Abstracts MA2022-02, n.º 64 (9 de octubre de 2022): 2364. http://dx.doi.org/10.1149/ma2022-02642364mtgabs.
Texto completoChandre, Pankaj R., Bhagyashree D. Shendkar, Sayalee Deshmukh, Sameer Kakade y Suvarna Potdukhe. "Machine Learning-Enhanced Advancements in Quantum Cryptography: A Comprehensive Review and Future Prospects". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 11s (10 de octubre de 2023): 642–55. http://dx.doi.org/10.17762/ijritcc.v11i11s.8300.
Texto completoShah, Aayush, Prabhat Mahato y Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm". International Journal for Research in Applied Science and Engineering Technology 11, n.º 8 (31 de agosto de 2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Texto completoBala, Romi y Hemant Pandey. "Advances in Discrete Mathematics: From Combinatorics to Cryptography". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, n.º 3 (13 de diciembre de 2019): 1643–46. http://dx.doi.org/10.61841/turcomat.v10i3.14624.
Texto completoSedat Sonko, Kenneth Ifeanyi Ibekwe, Valentine Ikenna Ilojianya, Emmanuel Augustine Etukudoh y Adefunke Fabuyide. "QUANTUM CRYPTOGRAPHY AND U.S. DIGITAL SECURITY: A COMPREHENSIVE REVIEW: INVESTIGATING THE POTENTIAL OF QUANTUM TECHNOLOGIES IN CREATING UNBREAKABLE ENCRYPTION AND THEIR FUTURE IN NATIONAL SECURITY". Computer Science & IT Research Journal 5, n.º 2 (18 de febrero de 2024): 390–414. http://dx.doi.org/10.51594/csitrj.v5i2.790.
Texto completoDhakne, Dr Amol, Prasann Shimpi, Sanket Halake, Shivam Dharmshetti y Shashank Singh. "Neural Network Based Message Concealment Scheme". International Journal for Research in Applied Science and Engineering Technology 10, n.º 5 (31 de mayo de 2022): 1368–78. http://dx.doi.org/10.22214/ijraset.2022.42522.
Texto completoPriya, R. Shanmuga y A. Senthilkumar. "A Study on Visual Cryptography for Colour Images". International Journal of Advanced Research in Computer Science and Software Engineering 7, n.º 7 (1 de agosto de 2017): 260. http://dx.doi.org/10.23956/ijarcsse/v7i7/0172.
Texto completoKaushal, Milind. "Cryptography: A Brief Review". International Journal for Research in Applied Science and Engineering Technology 10, n.º 2 (28 de febrero de 2022): 763–67. http://dx.doi.org/10.22214/ijraset.2022.40401.
Texto completoWang, Xing, Qiang Zhang y Xiao Peng Wei. "A New Encryption Method Based on Rijndael Algorithm and DNA Computing". Applied Mechanics and Materials 20-23 (enero de 2010): 1241–46. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1241.
Texto completoSankhyan, Bhanu. "Review on Symmetric and Asymmetric Cryptography". International Journal for Research in Applied Science and Engineering Technology 12, n.º 3 (31 de marzo de 2024): 2934–40. http://dx.doi.org/10.22214/ijraset.2024.59538.
Texto completoAbbasi, Faisal. "Quantum Cryptography: The Future of Internet and Security Management". Journal of Management and Service Science (JMSS) 1, n.º 1 (2021): 1–12. http://dx.doi.org/10.54060/jmss/001.01.004.
Texto completoBharati A. Patil, Prajakta R. Toke y Sharyu S. Naiknavare. "Research on Various Cryptography Techniques". International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, n.º 2 (22 de abril de 2024): 685–92. http://dx.doi.org/10.32628/cseit2410290.
Texto completoGeetha, M. y K. Akila. "SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS". IJISCS (International Journal of Information System and Computer Science) 2, n.º 3 (14 de marzo de 2019): 123. http://dx.doi.org/10.56327/ijiscs.v2i3.708.
Texto completoB S, Aditya y Sharadadevi Kaganurmath. "Use of Cryptography and Signing for Network Security". International Journal for Research in Applied Science and Engineering Technology 10, n.º 7 (31 de julio de 2022): 4080–83. http://dx.doi.org/10.22214/ijraset.2022.45926.
Texto completoSabaya, Dinaeli Paul, Adam Aloyce Semlambo y Joel Kazoba Simon. "Data Security Through Crypto-Stegano Systems". International Journal of Computational Science, Information Technology and Control Engineering 10, n.º 1/2/3 (27 de julio de 2023): 1–23. http://dx.doi.org/10.5121/ijcsitce.2023.10301.
Texto completoRani, Rashmi. "Quantum Cryptography: Fundamentals and Advanced Techniques". International Journal for Research in Applied Science and Engineering Technology 12, n.º 5 (31 de mayo de 2024): 5747–51. http://dx.doi.org/10.22214/ijraset.2024.62943.
Texto completoNana, Nana y Puguh Wahyu Prasetyo. "An implementation of Hill cipher and 3x3x3 rubik's cube to enhance communication security". Bulletin of Applied Mathematics and Mathematics Education 1, n.º 2 (10 de diciembre de 2021): 75–92. http://dx.doi.org/10.12928/bamme.v1i2.4252.
Texto completoVignesh, R. Sakthi, S. Sudharssun y K. J. Jegadish kumar. "Contemporary Cryptography and Arguments for Classical Cryptography's Endurance alongside the Propitious Quantum Cryptography". International Journal of Computer Applications 1, n.º 26 (25 de febrero de 2010): 59–64. http://dx.doi.org/10.5120/479-786.
Texto completoViresh, Kasheenath Babaleshwar, Karade Sinchana, N. Sakshi y Naidu Anush. "Audio encryption and decryption using AES algorithm technique". i-manager’s Journal on Electronics Engineering 14, n.º 2 (2024): 8. http://dx.doi.org/10.26634/jele.14.2.20486.
Texto completoIrawan, Muhammad Dedi. "IMPLEMENTASI KRIPTOGRAFI VIGENERE CIPHER DENGAN PHP". JURNAL TEKNOLOGI INFORMASI 1, n.º 1 (1 de junio de 2017): 11. http://dx.doi.org/10.36294/jurti.v1i1.21.
Texto completoDrzazga, Bartosz y Łukasz Krzywiecki. "Review of Chosen Isogeny-Based Cryptographic Schemes". Cryptography 6, n.º 2 (31 de mayo de 2022): 27. http://dx.doi.org/10.3390/cryptography6020027.
Texto completoTama, Yanuar Bhakti Wira y Muhammad Firdhausi Fahmi. "Sistem Kriptografi Klasik Dengan Memanfaatkan Orde Dari Grup Titik Pada Kurva Eliptik Bentuk Montgomery". Euler : Jurnal Ilmiah Matematika, Sains dan Teknologi 11, n.º 2 (16 de diciembre de 2023): 361–71. http://dx.doi.org/10.37905/euler.v11i2.23009.
Texto completoYalla, Surya Prakash, Archana Uriti, Abhisek Sethy y Sathishkumar V. E. "Secure method of communication using Quantum Key Distribution". Applied and Computational Engineering 30, n.º 1 (22 de enero de 2024): 32–37. http://dx.doi.org/10.54254/2755-2721/30/20230065.
Texto completoLiang, Yuheng. "A research on applications of neural network-based cryptography". Applied and Computational Engineering 14, n.º 1 (23 de octubre de 2023): 258–64. http://dx.doi.org/10.54254/2755-2721/14/20230798.
Texto completoDarko, Cyprian Danso. "Data Security in the Cloud Using Multi-Modal Bio-Cryptographic Authentication". Advances in Multidisciplinary and scientific Research Journal Publication 10, n.º 4 (30 de noviembre de 2022): 9–14. http://dx.doi.org/10.22624/aims/digital/v10n4p2.
Texto completoOsorio, Julian, Carlos Trujillo y Diego Ruiz. "Construction of a cryptographic function based on Bose-type Sidon sets". AIMS Mathematics 9, n.º 7 (2024): 17590–605. http://dx.doi.org/10.3934/math.2024855.
Texto completoManap, Abusaid, Gulnar Abitova, Gulzhan Uskenbayeva y Aigul Shaikhanova. "DESIGN OF TECHNOLOGY FOR SECURE FILE STORAGE BASED ON HYBRID CRYPTOGRAPHY METHODS: SHORT OVERVIEW". Вестник КазАТК 129, n.º 6 (22 de diciembre de 2023): 205–15. http://dx.doi.org/10.52167/1609-1817-2023-129-6-205-215.
Texto completoFeltovic, Milan. "FROM THEORY TO PRACTICE: THE ROLE OF CRYPTOGRAPHY IN SECURING BLOCKCHAIN NETWORKS". MEST Journal 12, n.º 2 (15 de julio de 2024): 93–102. http://dx.doi.org/10.12709/mest.12.12.02.12.
Texto completoGil Molk, Ali Mohammad Norouzzadeh, Mohammad Reza Aref y Reza Ramazani Khorshiddoust. "Analysis of design goals of cryptography algorithms based on different components". Indonesian Journal of Electrical Engineering and Computer Science 23, n.º 1 (1 de julio de 2021): 540. http://dx.doi.org/10.11591/ijeecs.v23.i1.pp540-548.
Texto completoDanoyan, D. H. "EXTENDING WHITE-BOX CRYPTOGRAPHY BASED OBLIVIOUS TRANSFER PROTOCOL". Proceedings of the YSU A: Physical and Mathematical Sciences 50, n.º 1 (239) (18 de marzo de 2016): 40–44. http://dx.doi.org/10.46991/psyu:a/2016.50.1.040.
Texto completoZHANG, YU. "The computational SLR: a logic for reasoning about computational indistinguishability". Mathematical Structures in Computer Science 20, n.º 5 (octubre de 2010): 951–75. http://dx.doi.org/10.1017/s0960129510000265.
Texto completo