Articoli di riviste sul tema "Cryptography"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Cryptography".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Yan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)". Journal of Physics: Conference Series 2386, n. 1 (1 dicembre 2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Testo completoGoldreich, Oded. "Cryptography and cryptographic protocols". Distributed Computing 16, n. 2-3 (1 settembre 2003): 177–99. http://dx.doi.org/10.1007/s00446-002-0077-1.
Testo completoAnilkumar, Chunduru, Bhavani Gorle e Kinthali Sowmya. "A Secure Method of Communication in Conventional Cryptography using Quantum Key Distribution". Applied and Computational Engineering 8, n. 1 (1 agosto 2023): 68–73. http://dx.doi.org/10.54254/2755-2721/8/20230083.
Testo completoRusetskaya, Irina A. "CRYPTOGRAPHY. FROM THE PAST TO THE FUTURE". RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, n. 4 (2021): 47–57. http://dx.doi.org/10.28995/2686-679x-2021-4-47-57.
Testo completoVictor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat e Abdullayeva Shakhzoda. "Cryptography: Advances in Secure Communication and Data Protection". E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.
Testo completoAnilkumar, Chunduru, Swathi Lenka, N. Neelima e Sathishkumar V E. "A Secure Method of Communication Through BB84 Protocol in Quantum Key Distribution". Scalable Computing: Practice and Experience 25, n. 1 (4 gennaio 2024): 21–33. http://dx.doi.org/10.12694/scpe.v25i1.2152.
Testo completoWANG, XINGYUAN, MING LIU e NINI GU. "TWO NEW CHAOTIC CRYPTOGRAPHIES BASED ON DIFFERENT ATTRACTOR-PARTITION ALGORITHMS". International Journal of Modern Physics B 21, n. 27 (30 ottobre 2007): 4739–50. http://dx.doi.org/10.1142/s0217979207038071.
Testo completoShashi Raj K. "The Intersection of Algebra and Cryptography: Enhancing Information Security through Mathematical Foundations". Communications on Applied Nonlinear Analysis 31, n. 4s (5 luglio 2024): 466–89. http://dx.doi.org/10.52783/cana.v31.943.
Testo completoYadav, Sonam. "An Extensive Study on Lattice-Based Cryptography and its Applications for RLWE-Based Problems". Universal Research Reports 10, n. 3 (2023): 104–10. http://dx.doi.org/10.36676/urr.2023-v10i3-014.
Testo completoOh, Chaerin, Woosang Im, Hyunil Kim e Changho Seo. "Recent Trends in Cryptanalysis Techniques for White-box Block Ciphers". Korean Institute of Smart Media 12, n. 9 (30 ottobre 2023): 9–18. http://dx.doi.org/10.30693/smj.2023.12.9.9.
Testo completoBAFTIU, Naim. "Analysis and use of Cryptography techniques in programming language C#: Coding and Decoding". PRIZREN SOCIAL SCIENCE JOURNAL 4, n. 3 (31 dicembre 2020): 1–10. http://dx.doi.org/10.32936/pssj.v4i3.165.
Testo completoHammad, Baraa Tareq, Ali Maki Sagheer, Ismail Taha Ahmed e Norziana Jamil. "A comparative review on symmetric and asymmetric DNA-based cryptography". Bulletin of Electrical Engineering and Informatics 9, n. 6 (1 dicembre 2020): 2484–91. http://dx.doi.org/10.11591/eei.v9i6.2470.
Testo completoKumar,, Varun. "Challenges and Future Trends of Cryptography in Internet of Things". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n. 04 (10 aprile 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30505.
Testo completoEt. al., Mandru Manisha,. "Colour Visual Cryptography (3,3) Scheme". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n. 2 (10 aprile 2021): 3189–98. http://dx.doi.org/10.17762/turcomat.v12i2.2374.
Testo completoTeja, Penumantra Satya Sai, Mounika Lakshmi P e Vinay Kumar K. "A Secure Communication through Quantum Key Distribution Protocols". International Research Journal of Electronics and Computer Engineering 4, n. 3 (30 settembre 2018): 14. http://dx.doi.org/10.24178/irjece.2018.4.3.14.
Testo completoSabani, Maria E., Ilias K. Savvas e Georgia Garani. "Learning with Errors: A Lattice-Based Keystone of Post-Quantum Cryptography". Signals 5, n. 2 (13 aprile 2024): 216–43. http://dx.doi.org/10.3390/signals5020012.
Testo completoDabola, Shashank. "Chat Secure-Messaging Application Based on Secure Encryption Algorithm". International Journal for Research in Applied Science and Engineering Technology 12, n. 3 (31 marzo 2024): 303–5. http://dx.doi.org/10.22214/ijraset.2024.58817.
Testo completoSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications". Mathematical Statistician and Engineering Applications 70, n. 1 (31 gennaio 2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Testo completoDubey, Praveer, e Ompal Yadav. "A Survey on Quantum cryptography versus classical Cryptography". International Journal of Current Engineering and Technology 10, n. 06 (31 ottobre 2021): 910–13. http://dx.doi.org/10.14741/ijcet/v.10.6.3.
Testo completoAkram, Zaryab. "Cryptology Based on Laplace Transform of Hyperbolic Function and Matrix Decomposition Method". ECS Meeting Abstracts MA2022-02, n. 64 (9 ottobre 2022): 2364. http://dx.doi.org/10.1149/ma2022-02642364mtgabs.
Testo completoChandre, Pankaj R., Bhagyashree D. Shendkar, Sayalee Deshmukh, Sameer Kakade e Suvarna Potdukhe. "Machine Learning-Enhanced Advancements in Quantum Cryptography: A Comprehensive Review and Future Prospects". International Journal on Recent and Innovation Trends in Computing and Communication 11, n. 11s (10 ottobre 2023): 642–55. http://dx.doi.org/10.17762/ijritcc.v11i11s.8300.
Testo completoShah, Aayush, Prabhat Mahato e Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm". International Journal for Research in Applied Science and Engineering Technology 11, n. 8 (31 agosto 2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Testo completoBala, Romi, e Hemant Pandey. "Advances in Discrete Mathematics: From Combinatorics to Cryptography". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, n. 3 (13 dicembre 2019): 1643–46. http://dx.doi.org/10.61841/turcomat.v10i3.14624.
Testo completoSedat Sonko, Kenneth Ifeanyi Ibekwe, Valentine Ikenna Ilojianya, Emmanuel Augustine Etukudoh e Adefunke Fabuyide. "QUANTUM CRYPTOGRAPHY AND U.S. DIGITAL SECURITY: A COMPREHENSIVE REVIEW: INVESTIGATING THE POTENTIAL OF QUANTUM TECHNOLOGIES IN CREATING UNBREAKABLE ENCRYPTION AND THEIR FUTURE IN NATIONAL SECURITY". Computer Science & IT Research Journal 5, n. 2 (18 febbraio 2024): 390–414. http://dx.doi.org/10.51594/csitrj.v5i2.790.
Testo completoDhakne, Dr Amol, Prasann Shimpi, Sanket Halake, Shivam Dharmshetti e Shashank Singh. "Neural Network Based Message Concealment Scheme". International Journal for Research in Applied Science and Engineering Technology 10, n. 5 (31 maggio 2022): 1368–78. http://dx.doi.org/10.22214/ijraset.2022.42522.
Testo completoPriya, R. Shanmuga, e A. Senthilkumar. "A Study on Visual Cryptography for Colour Images". International Journal of Advanced Research in Computer Science and Software Engineering 7, n. 7 (1 agosto 2017): 260. http://dx.doi.org/10.23956/ijarcsse/v7i7/0172.
Testo completoKaushal, Milind. "Cryptography: A Brief Review". International Journal for Research in Applied Science and Engineering Technology 10, n. 2 (28 febbraio 2022): 763–67. http://dx.doi.org/10.22214/ijraset.2022.40401.
Testo completoWang, Xing, Qiang Zhang e Xiao Peng Wei. "A New Encryption Method Based on Rijndael Algorithm and DNA Computing". Applied Mechanics and Materials 20-23 (gennaio 2010): 1241–46. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1241.
Testo completoSankhyan, Bhanu. "Review on Symmetric and Asymmetric Cryptography". International Journal for Research in Applied Science and Engineering Technology 12, n. 3 (31 marzo 2024): 2934–40. http://dx.doi.org/10.22214/ijraset.2024.59538.
Testo completoAbbasi, Faisal. "Quantum Cryptography: The Future of Internet and Security Management". Journal of Management and Service Science (JMSS) 1, n. 1 (2021): 1–12. http://dx.doi.org/10.54060/jmss/001.01.004.
Testo completoBharati A. Patil, Prajakta R. Toke e Sharyu S. Naiknavare. "Research on Various Cryptography Techniques". International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, n. 2 (22 aprile 2024): 685–92. http://dx.doi.org/10.32628/cseit2410290.
Testo completoGeetha, M., e K. Akila. "SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS". IJISCS (International Journal of Information System and Computer Science) 2, n. 3 (14 marzo 2019): 123. http://dx.doi.org/10.56327/ijiscs.v2i3.708.
Testo completoB S, Aditya, e Sharadadevi Kaganurmath. "Use of Cryptography and Signing for Network Security". International Journal for Research in Applied Science and Engineering Technology 10, n. 7 (31 luglio 2022): 4080–83. http://dx.doi.org/10.22214/ijraset.2022.45926.
Testo completoSabaya, Dinaeli Paul, Adam Aloyce Semlambo e Joel Kazoba Simon. "Data Security Through Crypto-Stegano Systems". International Journal of Computational Science, Information Technology and Control Engineering 10, n. 1/2/3 (27 luglio 2023): 1–23. http://dx.doi.org/10.5121/ijcsitce.2023.10301.
Testo completoRani, Rashmi. "Quantum Cryptography: Fundamentals and Advanced Techniques". International Journal for Research in Applied Science and Engineering Technology 12, n. 5 (31 maggio 2024): 5747–51. http://dx.doi.org/10.22214/ijraset.2024.62943.
Testo completoNana, Nana, e Puguh Wahyu Prasetyo. "An implementation of Hill cipher and 3x3x3 rubik's cube to enhance communication security". Bulletin of Applied Mathematics and Mathematics Education 1, n. 2 (10 dicembre 2021): 75–92. http://dx.doi.org/10.12928/bamme.v1i2.4252.
Testo completoVignesh, R. Sakthi, S. Sudharssun e K. J. Jegadish kumar. "Contemporary Cryptography and Arguments for Classical Cryptography's Endurance alongside the Propitious Quantum Cryptography". International Journal of Computer Applications 1, n. 26 (25 febbraio 2010): 59–64. http://dx.doi.org/10.5120/479-786.
Testo completoViresh, Kasheenath Babaleshwar, Karade Sinchana, N. Sakshi e Naidu Anush. "Audio encryption and decryption using AES algorithm technique". i-manager’s Journal on Electronics Engineering 14, n. 2 (2024): 8. http://dx.doi.org/10.26634/jele.14.2.20486.
Testo completoIrawan, Muhammad Dedi. "IMPLEMENTASI KRIPTOGRAFI VIGENERE CIPHER DENGAN PHP". JURNAL TEKNOLOGI INFORMASI 1, n. 1 (1 giugno 2017): 11. http://dx.doi.org/10.36294/jurti.v1i1.21.
Testo completoDrzazga, Bartosz, e Łukasz Krzywiecki. "Review of Chosen Isogeny-Based Cryptographic Schemes". Cryptography 6, n. 2 (31 maggio 2022): 27. http://dx.doi.org/10.3390/cryptography6020027.
Testo completoTama, Yanuar Bhakti Wira, e Muhammad Firdhausi Fahmi. "Sistem Kriptografi Klasik Dengan Memanfaatkan Orde Dari Grup Titik Pada Kurva Eliptik Bentuk Montgomery". Euler : Jurnal Ilmiah Matematika, Sains dan Teknologi 11, n. 2 (16 dicembre 2023): 361–71. http://dx.doi.org/10.37905/euler.v11i2.23009.
Testo completoYalla, Surya Prakash, Archana Uriti, Abhisek Sethy e Sathishkumar V. E. "Secure method of communication using Quantum Key Distribution". Applied and Computational Engineering 30, n. 1 (22 gennaio 2024): 32–37. http://dx.doi.org/10.54254/2755-2721/30/20230065.
Testo completoLiang, Yuheng. "A research on applications of neural network-based cryptography". Applied and Computational Engineering 14, n. 1 (23 ottobre 2023): 258–64. http://dx.doi.org/10.54254/2755-2721/14/20230798.
Testo completoDarko, Cyprian Danso. "Data Security in the Cloud Using Multi-Modal Bio-Cryptographic Authentication". Advances in Multidisciplinary and scientific Research Journal Publication 10, n. 4 (30 novembre 2022): 9–14. http://dx.doi.org/10.22624/aims/digital/v10n4p2.
Testo completoOsorio, Julian, Carlos Trujillo e Diego Ruiz. "Construction of a cryptographic function based on Bose-type Sidon sets". AIMS Mathematics 9, n. 7 (2024): 17590–605. http://dx.doi.org/10.3934/math.2024855.
Testo completoManap, Abusaid, Gulnar Abitova, Gulzhan Uskenbayeva e Aigul Shaikhanova. "DESIGN OF TECHNOLOGY FOR SECURE FILE STORAGE BASED ON HYBRID CRYPTOGRAPHY METHODS: SHORT OVERVIEW". Вестник КазАТК 129, n. 6 (22 dicembre 2023): 205–15. http://dx.doi.org/10.52167/1609-1817-2023-129-6-205-215.
Testo completoFeltovic, Milan. "FROM THEORY TO PRACTICE: THE ROLE OF CRYPTOGRAPHY IN SECURING BLOCKCHAIN NETWORKS". MEST Journal 12, n. 2 (15 luglio 2024): 93–102. http://dx.doi.org/10.12709/mest.12.12.02.12.
Testo completoGil Molk, Ali Mohammad Norouzzadeh, Mohammad Reza Aref e Reza Ramazani Khorshiddoust. "Analysis of design goals of cryptography algorithms based on different components". Indonesian Journal of Electrical Engineering and Computer Science 23, n. 1 (1 luglio 2021): 540. http://dx.doi.org/10.11591/ijeecs.v23.i1.pp540-548.
Testo completoDanoyan, D. H. "EXTENDING WHITE-BOX CRYPTOGRAPHY BASED OBLIVIOUS TRANSFER PROTOCOL". Proceedings of the YSU A: Physical and Mathematical Sciences 50, n. 1 (239) (18 marzo 2016): 40–44. http://dx.doi.org/10.46991/psyu:a/2016.50.1.040.
Testo completoZHANG, YU. "The computational SLR: a logic for reasoning about computational indistinguishability". Mathematical Structures in Computer Science 20, n. 5 (ottobre 2010): 951–75. http://dx.doi.org/10.1017/s0960129510000265.
Testo completo