Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Cryptography.

Articles de revues sur le sujet « Cryptography »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Cryptography ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Yan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)." Journal of Physics: Conference Series 2386, no. 1 (2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.

Texte intégral
Résumé :
Abstract Elliptic Curve Cryptography (ECC) is one of the strongest and most efficient cryptographic techniques in modern cryptography. This paper gives the following introduction: The introduction of cryptography’s development; the introduction of the elliptic curve; the principle of ECC; the horizontal comparison between ECC and other types of cryptography; the modern breakthrough of ECC; the applications of ECC; by using a method of literature review. The study’s findings indicate that this factor is responsible for the rapid historical development of cryptography, from the classical passwor
Styles APA, Harvard, Vancouver, ISO, etc.
2

Goldreich, Oded. "Cryptography and cryptographic protocols." Distributed Computing 16, no. 2-3 (2003): 177–99. http://dx.doi.org/10.1007/s00446-002-0077-1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Adeyemi Afolayan Adesola, Awele Mary-rose Ilusanmi, and Peter Chimee. "A review of the cryptographic approaches to data security: The impact of quantum computing, evolving challenges and future solutions." World Journal of Advanced Research and Reviews 25, no. 2 (2025): 1916–24. https://doi.org/10.30574/wjarr.2025.25.2.0434.

Texte intégral
Résumé :
Cryptography plays a fundamental role in defending digital data against cyberthreats and emerging quantum computer capabilities. This review discusses core cryptographic techniques such as symmetric encryption, asymmetric encryption and cryptographic hashing, as well as advanced techniques like lattice-based cryptography , code-based cryptography, multi-variate polynomial cryptography and hash-based cryptography that are quantum resistant. The review share insight into the applications of cryptographic techniques in securing communications, encrypting databases, blockchain technology, and heal
Styles APA, Harvard, Vancouver, ISO, etc.
4

Anilkumar, Chunduru, Bhavani Gorle, and Kinthali Sowmya. "A Secure Method of Communication in Conventional Cryptography using Quantum Key Distribution." Applied and Computational Engineering 8, no. 1 (2023): 68–73. http://dx.doi.org/10.54254/2755-2721/8/20230083.

Texte intégral
Résumé :
Security knowledge is one of the foremost challenges in the present day. When the topic is about Information security, the concept of cryptography comes into the picture. Every day, people and organizations use cryptography to maintain the confidentiality of their communications and data as well as to preserve their privacy. Today, one of the most successful methods used by businesses to protect their storage systems, whether at rest or in transit, is cryptography. Yet, cryptography is an effective technique to secure the data, the modern technology can break the cryptographic techniques. But
Styles APA, Harvard, Vancouver, ISO, etc.
5

Donia Fadil Chalob, Rusul Hussein Hasan, and Suaad M. Saber. "A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis." International Journal of Scientific Research in Science, Engineering and Technology 12, no. 1 (2025): 275–82. https://doi.org/10.32628/ijsrset25121171.

Texte intégral
Résumé :
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security
Styles APA, Harvard, Vancouver, ISO, etc.
6

Pasupuleti, Murali Krishna. "Post-Quantum Cryptography: Algorithms and Implementation Challenges." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 06 (2025): 234–43. https://doi.org/10.62311/nesx/rphcrcscrbc4.

Texte intégral
Résumé :
The advent of quantum computing presents a significant threat to classical public-key cryptographic systems, including RSA and Elliptic Curve Cryptography (ECC), thereby accelerating the development and standardization of post-quantum cryptography (PQC). This study evaluates the performance and implementation challenges of leading PQC algorithms across three major categories: lattice-based, hash-based, and multivariate cryptographic schemes. Utilizing empirical benchmark data from NIST candidate algorithms, the analysis focuses on key generation time, encryption latency, and memory consumption
Styles APA, Harvard, Vancouver, ISO, etc.
7

Bhoomika, P. Shetty, S. Darshan, B. R. Drakshayanamma, and Abdulhayan Sayed. "Review on Quantum Key Distribution." Journal of Optical Communication Electronics 5, no. 2 (2019): 1–4. https://doi.org/10.5281/zenodo.2656087.

Texte intégral
Résumé :
<em>There have been tremendous developments in the field of cryptography. Quantum computers is one among them. Solving complex mathematical calculations are made easy using quantum computers. Introducing quantum physics into cryptography led to growth of quantum cryptography. Quantum cryptography is a technique of using photons to generate a cryptographic key and transmit it to a receiver using a suitable communication channel. Quantum cryptography uses quantum mechanical principles such as Heisenberg Uncertainty principle and photon polarisation principle to perform cryptographic tasks toward
Styles APA, Harvard, Vancouver, ISO, etc.
8

Wei, Yuchong. "A Survey of Lattice Cryptography." Applied and Computational Engineering 135, no. 1 (2025): 210–16. https://doi.org/10.54254/2755-2721/2025.21190.

Texte intégral
Résumé :
Lattice cryptography has become one of the focal points in the era of quantum computing development. RSA and ECC, traditional public key cryptosystems, may become insecure in the face of quantum computers. In contrast, lattice cryptography is considered a potential solution for cryptographic security in the quantum computing age due to its inherent mathematical problems that require the use of quantum computers to solve. Moreover, lattice cryptographic algorithms can achieve efficient encryption and decryption processes and support a variety of cryptographic constructions, including encryption
Styles APA, Harvard, Vancouver, ISO, etc.
9

Pasupuleti, Murali Krishna. "Algebraic Geometry Methods in Cryptographic Protocol Design." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 04 (2025): 296–304. https://doi.org/10.62311/nesx/rp2525.

Texte intégral
Résumé :
Abstract: Algebraic geometry offers a powerful and elegant mathematical framework for the design and analysis of modern cryptographic protocols. This research paper investigates the application of algebraic geometry methods—such as elliptic curves, abelian varieties, and projective algebraic structures—in enhancing the security, efficiency, and scalability of cryptographic systems. By bridging advanced algebraic structures with cryptographic primitives, the study demonstrates how algebraic geometry enables the construction of secure public key protocols, zero-knowledge proofs, and post-quantum
Styles APA, Harvard, Vancouver, ISO, etc.
10

Rusetskaya, Irina A. "CRYPTOGRAPHY. FROM THE PAST TO THE FUTURE." RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, no. 4 (2021): 47–57. http://dx.doi.org/10.28995/2686-679x-2021-4-47-57.

Texte intégral
Résumé :
The article is devoted to the analysis of modern trends in the development of cryptography, which are related to the issues of cryptography of the past and are reflected in the prospects for the development of cryptography in the future. New trends in the development of cryptography that are relevant in recent decades are highlighted, the main ones of which include: awareness of the mathematical nature of data encryption problems, the rapid increase in the volume of processed and encrypted information that is distributed among a large unlimited circle of users of the modern data transmission d
Styles APA, Harvard, Vancouver, ISO, etc.
11

Goyal, Rohit. "Quantum Cryptography: Secure Communication Beyond Classical Limits." Journal of Quantum Science and Technology 1, no. 1 (2024): 1–5. http://dx.doi.org/10.36676/jqst.v1.i1.01.

Texte intégral
Résumé :
Quantum cryptography promises secure communication protocols that surpass the limitations of classical cryptography. By leveraging the principles of quantum mechanics, particularly the phenomenon of quantum entanglement and the uncertainty principle, quantum cryptography protocols offer provable security guarantees against eavesdropping attacks. In this paper, we provide an overview of quantum cryptography, discussing its theoretical foundations, key protocols such as quantum key distribution (QKD), and experimental implementations. We highlight the advantages of quantum cryptography over clas
Styles APA, Harvard, Vancouver, ISO, etc.
12

Victor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat, and Abdullayeva Shakhzoda. "Cryptography: Advances in Secure Communication and Data Protection." E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.

Texte intégral
Résumé :
In the innovative work secure communication and data protection are being main field, which are emerged by cryptography as a fundamental pillar. Strong cryptographic methods are now essential given the rising reliance on digital technologies and the threats posed by bad actors. This abstract examines the evolution of secure communication protocols and data protection techniques as it relates to the advancements in cryptography. The development of post-quantum cryptography is the most notable development in cryptography discussed in this study. As quantum computers become more powerful, they po
Styles APA, Harvard, Vancouver, ISO, etc.
13

Shuxrat, Toirov Abduganiyevich, Eldor Islomovich Saidakhmedov, and X.U Akbarov. "Enhancing post-quantum security through hybrid cryptographic systems integrating quantum key distribution." Yashil iqtisodiyot va taraqqiyot 3, no. 2 (2025): 6–10. https://doi.org/10.5281/zenodo.14868992.

Texte intégral
Résumé :
As quantum computing continues to evolve, traditional cryptographic systems face significant vulnerabilities,especially asymmetric algorithms based on factorization and discrete logarithms. In response, the integration of QuantumKey Distribution with post-quantum cryptography presents a promising hybrid approach to ensuring long-term data security.This new topic explores the design and development of cryptographic systems that combine the computational resilienceof post-quantum cryptography algorithms, such as lattice-based cryptography, with the physical security guaranteesprovided by Quantum
Styles APA, Harvard, Vancouver, ISO, etc.
14

Anilkumar, Chunduru, Swathi Lenka, N. Neelima, and Sathishkumar V E. "A Secure Method of Communication Through BB84 Protocol in Quantum Key Distribution." Scalable Computing: Practice and Experience 25, no. 1 (2024): 21–33. http://dx.doi.org/10.12694/scpe.v25i1.2152.

Texte intégral
Résumé :
Security awareness is one of the most pressing topics in today's globe. The idea of cryptography is introduced when the subject is information security. Conventional cryptography-based security techniques rely on the presumption that keys are shared before secure connections. The most crucial factor to consider when integrating cryptographic operations into account when integrating cryptographic operations in with any system is the safe key management strategy required for sending and transferring a secret key between two entities The systems will be vulnerable to bugs and possibly fatal exter
Styles APA, Harvard, Vancouver, ISO, etc.
15

WANG, XINGYUAN, MING LIU, and NINI GU. "TWO NEW CHAOTIC CRYPTOGRAPHIES BASED ON DIFFERENT ATTRACTOR-PARTITION ALGORITHMS." International Journal of Modern Physics B 21, no. 27 (2007): 4739–50. http://dx.doi.org/10.1142/s0217979207038071.

Texte intégral
Résumé :
The paper analyses the limitation of Baptista cryptography in partitioning an attractor, and proposes two new attractor-partition methods: uniform-partition algorithm and dynamic-partition algorithm. They are different from the equal-interval-partition algorithm in Baptista cryptography, but dividing the attractor according to the attractor's natural invariant density and plaintext density, respectively. The comparative experiment indicates: the two new methods improve the unbalanced cryptograph distribution and cryptograph length in Baptista cryptography, they are also able to reduce the iter
Styles APA, Harvard, Vancouver, ISO, etc.
16

Shashi Raj K. "The Intersection of Algebra and Cryptography: Enhancing Information Security through Mathematical Foundations." Communications on Applied Nonlinear Analysis 31, no. 4s (2024): 466–89. http://dx.doi.org/10.52783/cana.v31.943.

Texte intégral
Résumé :
The rapid advancements in digital technologies have necessitated the development of robust information security measures. This paper explores the intersection of algebra and cryptography, focusing on how algebraic principles can enhance cryptographic techniques to provide stronger security foundations. By leveraging mathematical structures such as groups, rings, and fields, we can address critical challenges in encryption, secure communications, and data privacy. This study reviews key algebraic methods used in contemporary cryptographic protocols, including elliptic curve cryptography, homomo
Styles APA, Harvard, Vancouver, ISO, etc.
17

Yadav, Sonam. "An Extensive Study on Lattice-Based Cryptography and its Applications for RLWE-Based Problems." Universal Research Reports 10, no. 3 (2023): 104–10. http://dx.doi.org/10.36676/urr.2023-v10i3-014.

Texte intégral
Résumé :
Lattice-based cryptography has emerged as a powerful paradigm for constructing secure cryptographic primitives, offering resistance to quantum attacks and providing a versatile framework for building post-quantum cryptographic systems. This research paper provides an in-depth exploration of lattice-based cryptography, focusing specifically on its applications for problems based on Ring Learning with Errors (RLWE). We analyze the fundamental concepts of lattice theory, delve into the RLWE problem, and highlight the security properties and challenges associated with lattice-based schemes. Furthe
Styles APA, Harvard, Vancouver, ISO, etc.
18

Oh, Chaerin, Woosang Im, Hyunil Kim, and Changho Seo. "Recent Trends in Cryptanalysis Techniques for White-box Block Ciphers." Korean Institute of Smart Media 12, no. 9 (2023): 9–18. http://dx.doi.org/10.30693/smj.2023.12.9.9.

Texte intégral
Résumé :
Black box cryptography is a cryptographic scheme based on a hardware encryption device, operating under the assumption that the device and the user can be trusted. However, with the increasing use of cryptographic algorithms on unreliable open platforms, the threats to black box cryptography systems have become even more significant. As a consequence, white box cryptography have been proposed to securely operate cryptographic algorithms on open platforms by hiding encryption keys during the encryption process, making it difficult for attackers to extract the keys. However, unlike traditional c
Styles APA, Harvard, Vancouver, ISO, etc.
19

BAFTIU, Naim. "Analysis and use of Cryptography techniques in programming language C#: Coding and Decoding." PRIZREN SOCIAL SCIENCE JOURNAL 4, no. 3 (2020): 1–10. http://dx.doi.org/10.32936/pssj.v4i3.165.

Texte intégral
Résumé :
Cryptography is an old idea and science, but its approach exists and plays a large role in modernization today. Conventional cryptographic techniques form the basis of today's cryptographic algorithm. The different categories of algorithms have their respective features; internally, in performance and implementation. Cryptographic schemes and mechanisms have undergone continuous improvement. The application of cryptography has grown increasingly, ranging from limited use in state institutions to widespread use by private individuals and companies. The increased use of the Internet has signific
Styles APA, Harvard, Vancouver, ISO, etc.
20

John, Michael, Ogoegbulem Ozioma, Perpetua Ngozi Obi, Henry Etaroghene Egbogho, and Otobong. G. Udoaka. "Lattices in Quantum-ERA Cryptography." International Journal of Research Publication and Reviews, V 4, no. 11 (2023): 2175–79. https://doi.org/10.5281/zenodo.10207210.

Texte intégral
Résumé :
The use of Mathematic in cryptography can result a safe encryption scheme. Lattices have emerged as a powerful mathematical tool in the field of cryptography, offering a diverse set of applications ranging from encryption to secure multi-party computation. This research paper provides a comprehensive review of the role of lattices in cryptography, covering both theoretical foundations and practical implementations. The paper begins by introducing the basic concepts of lattices and their relevance in cryptographic protocols. Subsequently, it explores key cryptographic primitives based on lattic
Styles APA, Harvard, Vancouver, ISO, etc.
21

Virk, Udayveer Singh, Devansh Verma, Gagandeep Singh, and Prof Sheetal Laroiya Prof. Sheetal Laroiya. "Analyzing Cryptographic Techniques and Machine Learning Algorithms for Crime Prediction." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem38099.

Texte intégral
Résumé :
This report discusses cryptography techniques. Network security is defined as "keeping information hidden and secure from unauthorized users," whereas cryptography is defined as "the science of data protection." The Fundamental Requirements for Data Transmission are addressed in this work and as well as security attacks such as Data Transmission Interruption, Interception, and Modification. The Cryptographic Framework is explained using a generalized function, in which data is encrypted and decrypted using techniques such as the RSA algorithm, Hash Functions, and other cryptographic algorithms
Styles APA, Harvard, Vancouver, ISO, etc.
22

Caleg Sadrak Sinaga, Alwi Findo Gultom, Dewi Ruth Nababan, Ari Rivaldo Simanjuntak, and Edi Ginting. "Cryptography With Mceliece Algorithm (Code Based Cryptography)." Jurnal Teknik Indonesia 3, no. 02 (2024): 49–53. https://doi.org/10.58471/ju-ti.v3i02.665.

Texte intégral
Résumé :
Cryptography is the science used to protect information from unauthorized access. One promising cryptographic algorithm is the McEliece algorithm, which uses code-based cryptography. This algorithm was introduced by Robert McEliece in 1978 and is known for its resistance to attacks from quantum computers, which are expected to be able to break most current cryptographic algorithms. The McEliece algorithm uses binary Goppa code for encryption and decryption, offering high execution speed and resistance to various types of attacks. Although one of its main drawbacks is the large public key size,
Styles APA, Harvard, Vancouver, ISO, etc.
23

Hammad, Baraa Tareq, Ali Maki Sagheer, Ismail Taha Ahmed, and Norziana Jamil. "A comparative review on symmetric and asymmetric DNA-based cryptography." Bulletin of Electrical Engineering and Informatics 9, no. 6 (2020): 2484–91. http://dx.doi.org/10.11591/eei.v9i6.2470.

Texte intégral
Résumé :
Current researchers have focused on DNA-based cryptography, in fact, DNA or deoxyribonucleic acid, has been applied in cryptography for performing computation as well as storing and transmitting information. In the present work, we made use of DNA in cryptographic, i.e. its storing capabilities (superior information density) and parallelism, in order to improve other classical cryptographic algorithms. Data encryption is made possible via DNA sequences. In this paper, two cases utilizing different DNA properties were studied by combining the DNA codes with those conventional cryptography algor
Styles APA, Harvard, Vancouver, ISO, etc.
24

Baraa, Tareq Hammad, Maki Sagheer Ali, Taha Ahmed Ismail, and Jamil Norziana. "A comparative review on symmetric and asymmetric DNA-based cryptography." Bulletin of Electrical Engineering and Informatics 9, no. 6 (2020): 2484–91. https://doi.org/10.11591/eei.v9i6.2470.

Texte intégral
Résumé :
Current researchers have focused on DNA-based cryptography, in fact, DNA or deoxyribonucleic acid, has been applied in cryptography for performing computation as well as storing and transmitting information. In the present work, we made use of DNA in cryptographic, i.e. its storing capabilities (superior information density) and parallelism, in order to improve other classical cryptographic algorithms. Data encryption is made possible via DNA sequences. In this paper, two cases utilizing different DNA properties were studied by combining the DNA codes with those conventional cryptography algor
Styles APA, Harvard, Vancouver, ISO, etc.
25

Et. al., Mandru Manisha,. "Colour Visual Cryptography (3,3) Scheme." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 3189–98. http://dx.doi.org/10.17762/turcomat.v12i2.2374.

Texte intégral
Résumé :
Visual Cryptography is an encryption technique which performs only encryption in cryptography, and it is used to encrypt every visual data. And this cryptography is different and unique in all cryptographic techniques, because of not performing decryption process mechanically, and that is done mechanically. In normal visual cryptography only black and white images are encrypted. In this paper we propose a different type of visual cryptography scheme for colour imagesin CMY format. And it protects the secret of the original image and no other techniques does not decrypt it except our decryption
Styles APA, Harvard, Vancouver, ISO, etc.
26

Kumar,, Varun. "Challenges and Future Trends of Cryptography in Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30505.

Texte intégral
Résumé :
The incorporation of cryptographic techniques is crucial for guaranteeing data privacy and security processed additionally sent inside IOT ecosystems, particularly as the IOT keeps growing. Examining problems including resource limitations, scalability, and the dynamic nature of IOT environments, this research paper explores the complex obstacles that cryptographic solutions confront considering the IOT. Lightweight cryptography, post-quantum cryptography, and blockchain integration are some of the new trends and future prospects in cryptographic research that are examined in this study in an
Styles APA, Harvard, Vancouver, ISO, etc.
27

Md., Aminur Rahman, and Nuruzzaman Laskar AKM. "Quantum Cryptography: Advancements and Implications for Network Security." Journal of Network Security and Data Mining 7, no. 3 (2024): 9–19. https://doi.org/10.5281/zenodo.11483650.

Texte intégral
Résumé :
<em>Quantum Cryptography has emerged as a revolutionary approach to network security, leveraging the principles of quantum mechanics to provide unprecedented levels of protection against contemporary and future threats. This paper explores the landscape of quantum cryptography, emphasizing its importance in addressing the dynamic challenges of network security. It outlines four research objectives aimed at investigating various aspects of quantum cryptography and their implications for network security. These objectives encompass exploring advancements in quantum cryptographic protocols, exami
Styles APA, Harvard, Vancouver, ISO, etc.
28

Teja, Penumantra Satya Sai, Mounika Lakshmi P, and Vinay Kumar K. "A Secure Communication through Quantum Key Distribution Protocols." International Research Journal of Electronics and Computer Engineering 4, no. 3 (2018): 14. http://dx.doi.org/10.24178/irjece.2018.4.3.14.

Texte intégral
Résumé :
Quantum cryptography is a new method of communication offering the security of the inviolability by using Law of Nature.Quantum Cryptography uses different secure communication by applying the phenomena of quantum physics. Unlike traditional classical cryptography, which uses mathematical techniques to restrict eavesdroppers, quantum cryptography is focused on the properties of physics of light for information. Quantum cryptography depends only on the validity of quantum theory, i.e., it is guarantied directly by the laws of physics. This is a different from any classical cryptographic techniq
Styles APA, Harvard, Vancouver, ISO, etc.
29

Redhu, Ritu, and Ekta Narwal. "An exploratory analysis of the evolution and trends of code-based cryptography." Journal of Discrete Mathematical Sciences and Cryptography 28, no. 3 (2025): 959–72. https://doi.org/10.47974/jdmsc-2236.

Texte intégral
Résumé :
Code-based cryptography has emerged as a promising paradigm in cryptographic research, offering robust security foundations against quantum computing threats. This bibliometric analysis provides a comprehensive overview of code-based cryptography scholarly contributions and trends using the Scopus’s extensive database. The relevant publications, including articles and conference papers are extracted to understand the evolution of code-based cryptography research over time. To map the intellectual structure of this field, the bibliometric indicators such as the performance of a 45-year span of
Styles APA, Harvard, Vancouver, ISO, etc.
30

Dabola, Shashank. "Chat Secure-Messaging Application Based on Secure Encryption Algorithm." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (2024): 303–5. http://dx.doi.org/10.22214/ijraset.2024.58817.

Texte intégral
Résumé :
Abstract: This study aims to explore the application of cryptography in various chat interfaces. Utilizing a systematic literature review methodology, we examine research conducted across various scientific platforms that bridge cryptography and the chat sector, as well as the intersection of cryptograph and database. The potential for advanced encryption algorithms to enhance the security of the user data is enormous. Implementing cryptography in chat interface presents competitive advantages, as numerous researchers have proposed and validated models that effectively optimize the use of cryp
Styles APA, Harvard, Vancouver, ISO, etc.
31

Ms., Kummasani Vinodhini. "Artifical Intelligence in Cryptography: Protection of Cryptographic System under Patents." Annual International Journal on Analysis of Contemporary Legal Affairs (AIJACLA) 5 (May 25, 2025): 95–111. https://doi.org/10.5281/zenodo.15514117.

Texte intégral
Résumé :
<em>Artificial Intelligence (AI) is transforming cryptographic approaches to encryption techniques, automating key generation, and strengthening safety mechanisms against cyber threats. Possible applications include strengthening data protection, detecting vulnerabilities, and optimizing cryptographic protocols. In particular, AI-based cryptographic models enhance the non- disable for security systems against advanced assaults, including those posed by quantum computing. Cryptography leverages AI through machine learning algorithms for anomaly detection, AI-based key management, and neural net
Styles APA, Harvard, Vancouver, ISO, etc.
32

Annu. "Algebraic Structures and Their Applications in Modern Cryptography." Innovative Research Thoughts 10, no. 3 (2024): 52–59. http://dx.doi.org/10.36676/irt.v10.i3.1433.

Texte intégral
Résumé :
Modern cryptography relies heavily on the principles of algebraic structures to ensure the security and integrity of data. This paper explores the fundamental algebraic structures that underpin contemporary cryptographic systems, including groups, rings, fields, and lattices. We provide a detailed examination of how these structures are employed in various cryptographic algorithms and protocols, such as public-key cryptography, digital signatures, and hash functions. an overview of basic algebraic concepts and their properties, followed by an in-depth analysis of their applications in cryptogr
Styles APA, Harvard, Vancouver, ISO, etc.
33

Mohammed, Anwar. "Quantum-Resistant Cryptography: Developing Encryption Against Quantum Attacks." Quantum-Resistant Cryptography: Developing Encryption Against Quantum Attacks 1, no. 1 (2018): 1–11. https://doi.org/10.5281/zenodo.14760501.

Texte intégral
Résumé :
Quantum computing presents both extraordinary potential and a significant threat to modern cryptographic systems. As the computational power of quantum computers grows, so too does the risk of rendering traditional encryption methods&mdash;especially those relying on factorization and discrete logarithms&mdash;obsolete. Quantum-resistant cryptography, also known as post-quantum cryptography, aims to develop new cryptographic protocols that can resist the capabilities of quantum computers. This paper explores the advancements in quantum computing, the vulnerabilities it presents to existing cry
Styles APA, Harvard, Vancouver, ISO, etc.
34

Singh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications." Mathematical Statistician and Engineering Applications 70, no. 1 (2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.

Texte intégral
Résumé :
In many applications, secure communication and data privacy are crucially supported by cryptography. The study of cryptography is now essential for creating strong and dependable security systems due to the growing risks to sensitive information in the digital era. The fundamentals of cryptography, its guiding principles, and its useful applications in securing communication channels and preserving data privacy are explored in this research article.Beginning with symmetric and asymmetric encryption techniques, the inquiry first looks at the fundamental ideas of encryption and decryption. It ex
Styles APA, Harvard, Vancouver, ISO, etc.
35

Sabani, Maria E., Ilias K. Savvas, and Georgia Garani. "Learning with Errors: A Lattice-Based Keystone of Post-Quantum Cryptography." Signals 5, no. 2 (2024): 216–43. http://dx.doi.org/10.3390/signals5020012.

Texte intégral
Résumé :
The swift advancement of quantum computing devices holds the potential to create robust machines that can tackle an extensive array of issues beyond the scope of conventional computers. Consequently, quantum computing machines create new risks at a velocity and scale never seen before, especially with regard to encryption. Lattice-based cryptography is regarded as post-quantum cryptography’s future and a competitor to a quantum computer attack. Thus, there are several advantages to lattice-based cryptographic protocols, including security, effectiveness, reduced energy usage and speed. In this
Styles APA, Harvard, Vancouver, ISO, etc.
36

Abiodun, O. Odedoyin, O. Odukoya Helen, and O. Oluwatope Ayodeji. "A Quantum Cryptography Protocol for Access Control in Big Data." International Journal on Cryptography and Information Security (IJCIS) 8, no. 2 (2018): 1–12. https://doi.org/10.5281/zenodo.1304106.

Texte intégral
Résumé :
ABSTRACT Modern cryptography targeted towards providing data confidentiality still pose some limitations. The security of public-key cryptography is based on unproven assumptions associated with the hardness /complicatedness of certain mathematical problems. However, public-key cryptography is not unconditionally secure: there is no proof that the problems on which it is based are intractable or even that their complexity is not polynomial. Therefore, public-key cryptography is not immune to unexpectedly strong computational power or better cryptanalysis techniques. The strength of modern cryp
Styles APA, Harvard, Vancouver, ISO, etc.
37

Khamalwa, Mulemi Simiyu. "Exploring how Commutative Algebra Underpins Cryptographic Protocols and Encryption Methods Used in Secure Communications and Data Protection." NEWPORT INTERNATIONAL JOURNAL OF SCIENTIFIC AND EXPERIMENTAL SCIENCES 5, no. 3 (2024): 58–62. http://dx.doi.org/10.59298/nijses/2024/10.5.586237.

Texte intégral
Résumé :
In the dynamic realm of cybersecurity, the principles of cryptography form the bedrock of secure communication and data protection. This review delves into the pivotal role of commutative algebra in the development and implementation of cryptographic protocols. Commutative algebra, encompassing commutative rings, fields, and groups, is integral to many encryption and decryption algorithms that safeguard digital information. This review explores various algebraic structures, including modular arithmetic, finite fields, and group theory, highlighting their significance in key cryptographic proce
Styles APA, Harvard, Vancouver, ISO, etc.
38

Akram, Zaryab. "Cryptology Based on Laplace Transform of Hyperbolic Function and Matrix Decomposition Method." ECS Meeting Abstracts MA2022-02, no. 64 (2022): 2364. http://dx.doi.org/10.1149/ma2022-02642364mtgabs.

Texte intégral
Résumé :
Cryptography is the art of coding and decoding the communication. Cryptography ensures the security of delicate information over some confidentiality breaching resources. In the recent age Cryptography has turned into a battleground of some of the world’s best mathematicians and computer scientists. A number of transforms like Sumudu transform, Laplace transform, Fourier transform, Kamal transform, Mellin transform, Jafari transform, Aboodh transform, N-transform, ELzaki transform, MAHGOUB transform are frequently used in cryptography. Cryptography is of great importance in every field of life
Styles APA, Harvard, Vancouver, ISO, etc.
39

Chandre, Pankaj R., Bhagyashree D. Shendkar, Sayalee Deshmukh, Sameer Kakade, and Suvarna Potdukhe. "Machine Learning-Enhanced Advancements in Quantum Cryptography: A Comprehensive Review and Future Prospects." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11s (2023): 642–55. http://dx.doi.org/10.17762/ijritcc.v11i11s.8300.

Texte intégral
Résumé :
Quantum cryptography has emerged as a promising paradigm for secure communication, leveraging the fundamental principles of quantum mechanics to guarantee information confidentiality and integrity. In recent years, the field of quantum cryptography has witnessed remarkable advancements, and the integration of machine learning techniques has further accelerated its progress. This research paper presents a comprehensive review of the latest developments in quantum cryptography, with a specific focus on the utilization of machine learning algorithms to enhance its capabilities. The paper begins b
Styles APA, Harvard, Vancouver, ISO, etc.
40

Dubey, Praveer, and Ompal Yadav. "A Survey on Quantum cryptography versus classical Cryptography." International Journal of Current Engineering and Technology 10, no. 06 (2021): 910–13. http://dx.doi.org/10.14741/ijcet/v.10.6.3.

Texte intégral
Résumé :
Quantum Cryptography is an approach to securing communications by applying the phenomena of quantum physics. Unlike traditional classical cryptography, which uses mathematical techniques to restrict eavesdroppers, quantum cryptography is focused on the physics of information. The development of quantum cryptography was motivated by the short-comings of classical cryptographic methods, which can be classified as either public-key or secret-key Methods. There are classical solutions to insecure communication all rely on making some or assumption, about the computational power of a cheater, about
Styles APA, Harvard, Vancouver, ISO, etc.
41

Bala, Romi, and Hemant Pandey. "Advances in Discrete Mathematics: From Combinatorics to Cryptography." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, no. 3 (2019): 1643–46. http://dx.doi.org/10.61841/turcomat.v10i3.14624.

Texte intégral
Résumé :
Discrete mathematics forms the foundation for various fields, including computer science and cryptography, by providing essential tools for problem-solving in discrete structures. This paper explores the advancements in discrete mathematics, focusing on combinatorics and cryptography. It discusses the basic concepts of combinatorics, such as permutations, combinations, and graph theory, along with their applications in modern cryptography. The paper also examines symmetric and public key cryptography algorithms, including DES, AES, RSA, and ECC, highlighting their key features and security mec
Styles APA, Harvard, Vancouver, ISO, etc.
42

Shah, Aayush, Prabhat Mahato, and Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.

Texte intégral
Résumé :
Abstract: This research paper surveys the landscape of cryptography, encompassing historical origins and modern applications. Beginning with foundational concepts, it explores encryption, decryption, ciphers, and keys, spanning symmetric and asymmetric cryptography. Historical context unfolds, tracing cryptography from ancient Egyptian hieroglyphs to Julius Caesar's cipher. The study then transitions to contemporary subjects. Elliptic Curves and Cryptography are investigated, showcasing their significance in secure communication, demonstrating ECC key exchange and AES-GCM encryption using pyth
Styles APA, Harvard, Vancouver, ISO, etc.
43

Sedat Sonko, Kenneth Ifeanyi Ibekwe, Valentine Ikenna Ilojianya, Emmanuel Augustine Etukudoh, and Adefunke Fabuyide. "QUANTUM CRYPTOGRAPHY AND U.S. DIGITAL SECURITY: A COMPREHENSIVE REVIEW: INVESTIGATING THE POTENTIAL OF QUANTUM TECHNOLOGIES IN CREATING UNBREAKABLE ENCRYPTION AND THEIR FUTURE IN NATIONAL SECURITY." Computer Science & IT Research Journal 5, no. 2 (2024): 390–414. http://dx.doi.org/10.51594/csitrj.v5i2.790.

Texte intégral
Résumé :
This study provides a comprehensive review of quantum cryptography and its implications for U.S. national security in the face of emerging quantum technologies. The primary objective is to investigate the potential of quantum cryptographic methods in creating unbreakable encryption and their future role in enhancing digital security. Employing a systematic literature review and content analysis, the study draws on recent peer-reviewed articles, institutional reports, and academic journals from 2013 to 2023. The methodology focuses on evaluating the evolution, current state, and challenges of q
Styles APA, Harvard, Vancouver, ISO, etc.
44

Dhakne, Dr Amol, Prasann Shimpi, Sanket Halake, Shivam Dharmshetti, and Shashank Singh. "Neural Network Based Message Concealment Scheme." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 1368–78. http://dx.doi.org/10.22214/ijraset.2022.42522.

Texte intégral
Résumé :
Abstract: Neural Cryptography is a new thread that integrates cryptography and neural networks for cryptanalysis and encryption applications. We show that Neural Networks can execute symmetric encryption in an adversarial context in this paper, and we build on the existing literature on the subject. Cryptography's purpose is to make it difficult to decipher a cypher and recreate the plain text without the associated key. Your messages are encrypted with excellent cryptography in such a way that brute force attacks against the algorithm or key are nearly impossible. Good cryptography is secure
Styles APA, Harvard, Vancouver, ISO, etc.
45

Ahmed, Mubbashir. "Lightweight Cryptographic Algorithm Development Using Fundamental Cryptographic Techniques." VFAST Transactions on Software Engineering 13, no. 1 (2025): 178–92. https://doi.org/10.21015/vtse.v13i1.2050.

Texte intégral
Résumé :
Cryptography is used to make data and information transmission and computational systems secure over the networks by using mathematical and scientific techniques. The cryptographic algorithm should fulfil the conditions of authentication, confidentiality, integrity and reliability. In today’s era, where digital communication and data storage is increasing day by day and the data leakage, breaches and attacks are continuously rising. The increase in need of strong and secure cryptography algorithms to protect user information that ensures the integrity and confidentiality of data. The existing
Styles APA, Harvard, Vancouver, ISO, etc.
46

Tejasweeni Pradhan. "Quantum Cryptography for Secure Autonomous Vehicle Networks." Advances in Nonlinear Variational Inequalities 28, no. 1s (2024): 449–59. https://doi.org/10.52783/anvi.v28.2445.

Texte intégral
Résumé :
As autonomous vehicle networks evolve, securing them against advanced cyber threats is becoming increasingly crucial. Traditional cryptographic methods are inadequate for these demands. This paper examines quantum cryptography, focusing on Quantum Key Distribution (QKD), to enhance security in these networks. A network architecture incorporating quantum cryptographic protocols, and an outline of the necessary hardware and software are proposed. Simulations demonstrate the advantages of quantum cryptography in ensuring data integrity, confidentiality, and authenticity. However, challenges such
Styles APA, Harvard, Vancouver, ISO, etc.
47

Priya, R. Shanmuga, and A. Senthilkumar. "A Study on Visual Cryptography for Colour Images." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 260. http://dx.doi.org/10.23956/ijarcsse/v7i7/0172.

Texte intégral
Résumé :
The intent of this paper is to present some of the major things about visual cryptography for colour images. The idea behind this technique is quite simple and powerful. Visual cryptography deals with visual information like picture, printed text and written notes etc. Visual cryptography also called secret sharing. As the name implies visual cryptography which has a single secret image and more than one shadow images and provided for numerous users. Visual cryptography process depends on various measures such as accuracy, computational complexity, pixel expansion, contrast whether generated i
Styles APA, Harvard, Vancouver, ISO, etc.
48

Olajide Soji Osundare, Chidiebere Somadina Ike, Ololade Gilbert Fakeyede, and Adebimpe Bolatito Ige. "Blockchain and quantum cryptography: Future of secure telecommunications in banking." Engineering Science & Technology Journal 3, no. 2 (2022): 154–71. http://dx.doi.org/10.51594/estj.v3i2.1523.

Texte intégral
Résumé :
The rapid evolution of telecommunications in the banking sector has necessitated advanced security measures to protect sensitive financial data and transactions. Blockchain technology, with its decentralized and immutable ledger system, has emerged as a promising solution for ensuring transparency, traceability, and security in banking communications. However, the potential threat posed by quantum computing to current cryptographic methods presents new challenges to the integrity of blockchain systems. Quantum cryptography, leveraging the principles of quantum mechanics, offers a robust altern
Styles APA, Harvard, Vancouver, ISO, etc.
49

Subhalaxmi Sabitri Das, Subhalaxmi Sabitri Das, Sachin Jena Sachin Jena, and H. Dipali Singh H.Dipali Singh. "The Role of Cryptography in Cyber Security." International Journal of Engineering and Science Invention 14, no. 5 (2025): 48–54. https://doi.org/10.35629/6734-14054854.

Texte intégral
Résumé :
One description of cryptography is the study and practice of information concealment. Cryptography intersects with fields like computer wisdom and mathematics. Among the terms used in this term paper are plaintext, or information to be conveyed, Cipher textbook, or ordinary textbook that has been made incomprehensible by an operation of a fine procedure, The key is a numerical value, formula, or procedure that establishes how a plaintext communication is translated or deciphered. The cryptographic algorithm, also, is a fine formula that's used to tousle the plain textbook to produce cipher tex
Styles APA, Harvard, Vancouver, ISO, etc.
50

Mathew Sebastian. "Cryptographic milestones: Origins, modern algorithms, and the quantum era." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 387–93. https://doi.org/10.30574/wjaets.2025.15.2.0561.

Texte intégral
Résumé :
Cryptography has played a pivotal role in securing communication across human history. From ancient techniques such as hieroglyphic substitutions and Caesar's cipher to contemporary cryptographic systems like RSA and Elliptic Curve Cryptography, the field has continuously adapted to evolving technological paradigms. This article provides a comprehensive review of the historical development of cryptography, highlighting key milestones from ancient Egypt and Mesopotamia, through the mechanical encryption devices of World War II, to the theoretical foundations established by Claude Shannon. It ex
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!