Gotowa bibliografia na temat „Cryptography”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Cryptography”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Cryptography"
Yan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)". Journal of Physics: Conference Series 2386, nr 1 (1.12.2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Pełny tekst źródłaGoldreich, Oded. "Cryptography and cryptographic protocols". Distributed Computing 16, nr 2-3 (1.09.2003): 177–99. http://dx.doi.org/10.1007/s00446-002-0077-1.
Pełny tekst źródłaAnilkumar, Chunduru, Bhavani Gorle i Kinthali Sowmya. "A Secure Method of Communication in Conventional Cryptography using Quantum Key Distribution". Applied and Computational Engineering 8, nr 1 (1.08.2023): 68–73. http://dx.doi.org/10.54254/2755-2721/8/20230083.
Pełny tekst źródłaRusetskaya, Irina A. "CRYPTOGRAPHY. FROM THE PAST TO THE FUTURE". RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, nr 4 (2021): 47–57. http://dx.doi.org/10.28995/2686-679x-2021-4-47-57.
Pełny tekst źródłaVictor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat i Abdullayeva Shakhzoda. "Cryptography: Advances in Secure Communication and Data Protection". E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.
Pełny tekst źródłaAnilkumar, Chunduru, Swathi Lenka, N. Neelima i Sathishkumar V E. "A Secure Method of Communication Through BB84 Protocol in Quantum Key Distribution". Scalable Computing: Practice and Experience 25, nr 1 (4.01.2024): 21–33. http://dx.doi.org/10.12694/scpe.v25i1.2152.
Pełny tekst źródłaWANG, XINGYUAN, MING LIU i NINI GU. "TWO NEW CHAOTIC CRYPTOGRAPHIES BASED ON DIFFERENT ATTRACTOR-PARTITION ALGORITHMS". International Journal of Modern Physics B 21, nr 27 (30.10.2007): 4739–50. http://dx.doi.org/10.1142/s0217979207038071.
Pełny tekst źródłaShashi Raj K. "The Intersection of Algebra and Cryptography: Enhancing Information Security through Mathematical Foundations". Communications on Applied Nonlinear Analysis 31, nr 4s (5.07.2024): 466–89. http://dx.doi.org/10.52783/cana.v31.943.
Pełny tekst źródłaYadav, Sonam. "An Extensive Study on Lattice-Based Cryptography and its Applications for RLWE-Based Problems". Universal Research Reports 10, nr 3 (2023): 104–10. http://dx.doi.org/10.36676/urr.2023-v10i3-014.
Pełny tekst źródłaOh, Chaerin, Woosang Im, Hyunil Kim i Changho Seo. "Recent Trends in Cryptanalysis Techniques for White-box Block Ciphers". Korean Institute of Smart Media 12, nr 9 (30.10.2023): 9–18. http://dx.doi.org/10.30693/smj.2023.12.9.9.
Pełny tekst źródłaRozprawy doktorskie na temat "Cryptography"
Poschmann, Axel York. "Lightweight cryptography cryptographic engineering for a pervasive world". Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2009. http://d-nb.info/996578153/04.
Pełny tekst źródłaAlmeida, Braga Daniel de. "Cryptography in the wild : the security of cryptographic implementations". Thesis, Rennes 1, 2022. http://www.theses.fr/2022REN1S067.
Pełny tekst źródłaSide-channel attacks are daunting for cryptographic implementations. Despite past attacks, and the proliferation of verification tools, these attacks still affect many implementations. In this manuscript, we address two aspects of this problem, centered around attack and defense. We unveil several microarchitectural side-channel attacks on implementations of PAKE protocols. In particular, we exposed attacks on Dragonfly, used in the new Wi-Fi standard WPA3, and SRP, deployed in many software such as ProtonMail or Apple HomeKit. We also explored the lack of use by developers of tools to detect such attacks. We questioned developers from various cryptographic projects to identify the origin of this lack. From their answers, we issued recommendations. Finally, in order to stop the spiral of attack-patch on Dragonfly implementations, we provide a formally verified implementation of the cryptographic layer of the protocol, whose execution is secret-independent
Yerushalmi, Yoav. "Incremental cryptography". Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42789.
Pełny tekst źródłaIncludes bibliographical references (leaves 147-148).
by Yoav Yerushalmi.
M.Eng.
Shamonin, K. E. "Quantum cryptography". Thesis, Sumy State University, 2018. http://essuir.sumdu.edu.ua/handle/123456789/66837.
Pełny tekst źródłaLopez, Samuel. "MODERN CRYPTOGRAPHY". CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/729.
Pełny tekst źródłaMinaud, Brice. "Analyse de primitives cryptographiques récentes". Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1S066/document.
Pełny tekst źródłaIn this thesis, we study the security of some recent cryptographic primitives, both symmetric and asymmetric. Along the way we also consider white-box primitives, which may be regarded as a middle ground between symmetric and asymmetric cryptography. We begin by showing the existence of non-trivial linear maps commuting with the round function of some recent block cipher designs, which give rise to self-similarity and invariant subspace attacks. We then move on to the structural cryptanalysis of ASASA schemes, where nonlinear layers S alternate with affine layers A. Our structural cryptanalysis applies to symmetric, multivariate, as well as white-box instances. Focusing on the white-box model of incompressibility, we then build an efficient block cipher and key generator that offer provable security guarantees. Finally, on the purely asymmetric side, we describe a polynomial attack against a recent multilinear map proposal
PRIYADHARSHINI, THIRUTHUVADOSS ANGELINE. "Comparison and Performance Evaluation of Modern Cryptography and DNA Cryptography". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-120103.
Pełny tekst źródłaNyman, Ellinor. "Cryptography : A study of modern cryptography and its mathematical methods". Thesis, Uppsala universitet, Analys och sannolikhetsteori, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-447460.
Pełny tekst źródłaIdrees, Zunera. "Elliptic Curves Cryptography". Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17544.
Pełny tekst źródłaRoe, Michael Robert. "Cryptography and evidence". Thesis, University of Cambridge, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.627396.
Pełny tekst źródłaKsiążki na temat "Cryptography"
Stinson, Douglas R., i Maura B. Paterson. Cryptography. Fourth edition. | Boca Raton : CRC Press, Taylor & Francis: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9781315282497.
Pełny tekst źródłaRubinstein-Salzedo, Simon. Cryptography. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94818-8.
Pełny tekst źródłaSlayton, Rebecca, red. Democratizing Cryptography. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3549993.
Pełny tekst źródłaFranklin, Matthew, red. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48390-x.
Pełny tekst źródłaOmondi, Amos R. Cryptography Arithmetic. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-34142-8.
Pełny tekst źródłaEasttom, William. Modern Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63115-4.
Pełny tekst źródłaHirschfeld, Rafael, red. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-63594-7.
Pełny tekst źródłaHirchfeld, Rafael, red. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0055468.
Pełny tekst źródłaFerguson, Niels, Bruce Schneier i Tadayoshi Kohno. Cryptography Engineering. Indianapolis, Indiana: Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781118722367.
Pełny tekst źródłaBlaze, Matt, red. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36504-4.
Pełny tekst źródłaCzęści książek na temat "Cryptography"
Hofheinz, Dennis, i Eike Kiltz. "Scalable Cryptography". W Lecture Notes in Computer Science, 169–78. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-21534-6_9.
Pełny tekst źródłaBuchmann, Johannes. "Sustainable Cryptography". W International Symposium on Mathematics, Quantum Theory, and Cryptography, 3. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5191-8_1.
Pełny tekst źródłaHardy, Yorick, i Willi-Hans Steeb. "Cryptography". W Classical and Quantum Computing, 215–28. Basel: Birkhäuser Basel, 2001. http://dx.doi.org/10.1007/978-3-0348-8366-5_11.
Pełny tekst źródłaWallis, W. D. "Cryptography". W Mathematics in the Real World, 157–67. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-8529-2_11.
Pełny tekst źródłaO’Regan, Gerard. "Cryptography". W Texts in Computer Science, 155–70. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44561-8_10.
Pełny tekst źródłaKoblitz, Neal. "Cryptography". W Mathematics Unlimited — 2001 and Beyond, 749–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/978-3-642-56478-9_38.
Pełny tekst źródłaKizza, Joseph Migga. "Cryptography". W Guide to Computer Network Security, 225–48. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_11.
Pełny tekst źródłaCorsini, Piergiulio, i Violeta Leoreanu. "Cryptography". W Applications of Hyperstructure Theory, 247–56. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4757-3714-1_8.
Pełny tekst źródłaHansmann, Uwe, Martin S. Nicklous, Thomas Schäck i Frank Seliger. "Cryptography". W Smart Card Application Development Using Java, 49–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-642-98052-7_4.
Pełny tekst źródłaNorberg, Scott. "Cryptography". W Advanced ASP.NET Core 3 Security, 57–101. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6014-2_3.
Pełny tekst źródłaStreszczenia konferencji na temat "Cryptography"
Slutsky, Boris A., R. Rao, L. Tancevski, P. C. Sun i Y. Fainman. "Information Leakage Estimates in Quantum Cryptography". W Optics in Computing. Washington, D.C.: Optica Publishing Group, 1997. http://dx.doi.org/10.1364/oc.1997.owc.2.
Pełny tekst źródłaFaz-Hernández, Armando, i Julio López. "High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves". W Concurso de Teses e Dissertações. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/ctd.2023.230156.
Pełny tekst źródłaDuta, Cristinaloredana, i Laura Gheorghe. "ELEARNING FRAMEWORK FOR UNDERSTANDING CRYPTOGRAPHY AT ALL LEVELS". W eLSE 2015. Carol I National Defence University Publishing House, 2015. http://dx.doi.org/10.12753/2066-026x-15-026.
Pełny tekst źródłaЛацин, Семен Михайлович, i Наталья Александровна Борсук. "ANALYSIS OF ELLIPTICAL CRYPTOGRAPHY ON THE EXAMPLE OF THE BITCOIN BLOCKCHAIN". W Методики фундаментальных и прикладных научных исследований: сборник статей всероссийской научной конференции (Санкт-Петербург, Декабрь 2022). Crossref, 2023. http://dx.doi.org/10.37539/221223.2022.83.11.008.
Pełny tekst źródłaBraga, Alexandre, i Ricardo Dahab. "A Longitudinal and Retrospective Study on How Developers Misuse Cryptography in Online Communities". W Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/sbseg.2017.19488.
Pełny tekst źródłaRodrigues, Gustavo Eloi de P., Alexandre M. Braga i Ricardo Dahab. "A machine learning approach to detect misuse of cryptographic APIs in source code". W Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19223.
Pełny tekst źródła"Medical Image Security Using Quantum Cryptography". W InSITE 2018: Informing Science + IT Education Conferences: La Verne California. Informing Science Institute, 2018. http://dx.doi.org/10.28945/3968.
Pełny tekst źródłaRanu Soni, Er. "Innovative field of cryptography: DNA cryptography". W The First International Conference on Information Technology Convergence and Services. Academy & Industry Research Collaboration Center (AIRCC), 2012. http://dx.doi.org/10.5121/csit.2012.2115.
Pełny tekst źródła"IOT Based Secure Data Storage System Using Cryptographic Algorithm". W The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/vdgo3829/ngcesi23p69.
Pełny tekst źródłaXia, Ruiqi, Manman Li i Shaozhen Chen. "Cryptographic Algorithms Identification based on Deep Learning". W 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121217.
Pełny tekst źródłaRaporty organizacyjne na temat "Cryptography"
Nechvatal, James. Public-key cryptography. Gaithersburg, MD: National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.sp.800-2.
Pełny tekst źródłade Abreu, Jonas, i Mariana Cunha e Melo. Extending Pix: An approach to offline Dynamic QR Code generation. Center for Technology and Public Interest, SL, kwiecień 2023. http://dx.doi.org/10.59262/9qu6ex.
Pełny tekst źródłaMouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, lipiec 2021. http://dx.doi.org/10.6028/nist.ir.8319.
Pełny tekst źródłaJonsson, J., i B. Kaliski. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. RFC Editor, luty 2003. http://dx.doi.org/10.17487/rfc3447.
Pełny tekst źródłaBlake-Wilson, S., D. Brown i P. Lambert. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). RFC Editor, kwiecień 2002. http://dx.doi.org/10.17487/rfc3278.
Pełny tekst źródłaTurner, S., i D. Brown. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). RFC Editor, styczeń 2010. http://dx.doi.org/10.17487/rfc5753.
Pełny tekst źródłaDraelos, Timothy John, Mark Dolan Torgerson, William Douglas Neumann, Donald R. Gallup, Michael Joseph Collins i Cheryl Lynn Beaver. Hybrid cryptography key management. Office of Scientific and Technical Information (OSTI), listopad 2003. http://dx.doi.org/10.2172/918318.
Pełny tekst źródłaMcKay, Kerry A., Larry Bassham, Meltem Sonmez Turan i Nicky Mouha. Report on lightweight cryptography. Gaithersburg, MD: National Institute of Standards and Technology, marzec 2017. http://dx.doi.org/10.6028/nist.ir.8114.
Pełny tekst źródłaTorgerson, Mark Dolan, Timothy John Draelos, Richard Crabtree Schroeppel, Russell D. Miller i William Erik Anderson. Small circuits for cryptography. Office of Scientific and Technical Information (OSTI), październik 2005. http://dx.doi.org/10.2172/875977.
Pełny tekst źródłaMcGrew, D., K. Igoe i M. Salter. Fundamental Elliptic Curve Cryptography Algorithms. RFC Editor, luty 2011. http://dx.doi.org/10.17487/rfc6090.
Pełny tekst źródła