Artykuły w czasopismach na temat „Cryptography”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Cryptography”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Yan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)". Journal of Physics: Conference Series 2386, nr 1 (1.12.2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Pełny tekst źródłaGoldreich, Oded. "Cryptography and cryptographic protocols". Distributed Computing 16, nr 2-3 (1.09.2003): 177–99. http://dx.doi.org/10.1007/s00446-002-0077-1.
Pełny tekst źródłaAnilkumar, Chunduru, Bhavani Gorle i Kinthali Sowmya. "A Secure Method of Communication in Conventional Cryptography using Quantum Key Distribution". Applied and Computational Engineering 8, nr 1 (1.08.2023): 68–73. http://dx.doi.org/10.54254/2755-2721/8/20230083.
Pełny tekst źródłaRusetskaya, Irina A. "CRYPTOGRAPHY. FROM THE PAST TO THE FUTURE". RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, nr 4 (2021): 47–57. http://dx.doi.org/10.28995/2686-679x-2021-4-47-57.
Pełny tekst źródłaVictor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat i Abdullayeva Shakhzoda. "Cryptography: Advances in Secure Communication and Data Protection". E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.
Pełny tekst źródłaAnilkumar, Chunduru, Swathi Lenka, N. Neelima i Sathishkumar V E. "A Secure Method of Communication Through BB84 Protocol in Quantum Key Distribution". Scalable Computing: Practice and Experience 25, nr 1 (4.01.2024): 21–33. http://dx.doi.org/10.12694/scpe.v25i1.2152.
Pełny tekst źródłaWANG, XINGYUAN, MING LIU i NINI GU. "TWO NEW CHAOTIC CRYPTOGRAPHIES BASED ON DIFFERENT ATTRACTOR-PARTITION ALGORITHMS". International Journal of Modern Physics B 21, nr 27 (30.10.2007): 4739–50. http://dx.doi.org/10.1142/s0217979207038071.
Pełny tekst źródłaShashi Raj K. "The Intersection of Algebra and Cryptography: Enhancing Information Security through Mathematical Foundations". Communications on Applied Nonlinear Analysis 31, nr 4s (5.07.2024): 466–89. http://dx.doi.org/10.52783/cana.v31.943.
Pełny tekst źródłaYadav, Sonam. "An Extensive Study on Lattice-Based Cryptography and its Applications for RLWE-Based Problems". Universal Research Reports 10, nr 3 (2023): 104–10. http://dx.doi.org/10.36676/urr.2023-v10i3-014.
Pełny tekst źródłaOh, Chaerin, Woosang Im, Hyunil Kim i Changho Seo. "Recent Trends in Cryptanalysis Techniques for White-box Block Ciphers". Korean Institute of Smart Media 12, nr 9 (30.10.2023): 9–18. http://dx.doi.org/10.30693/smj.2023.12.9.9.
Pełny tekst źródłaBAFTIU, Naim. "Analysis and use of Cryptography techniques in programming language C#: Coding and Decoding". PRIZREN SOCIAL SCIENCE JOURNAL 4, nr 3 (31.12.2020): 1–10. http://dx.doi.org/10.32936/pssj.v4i3.165.
Pełny tekst źródłaHammad, Baraa Tareq, Ali Maki Sagheer, Ismail Taha Ahmed i Norziana Jamil. "A comparative review on symmetric and asymmetric DNA-based cryptography". Bulletin of Electrical Engineering and Informatics 9, nr 6 (1.12.2020): 2484–91. http://dx.doi.org/10.11591/eei.v9i6.2470.
Pełny tekst źródłaKumar,, Varun. "Challenges and Future Trends of Cryptography in Internet of Things". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 04 (10.04.2024): 1–5. http://dx.doi.org/10.55041/ijsrem30505.
Pełny tekst źródłaEt. al., Mandru Manisha,. "Colour Visual Cryptography (3,3) Scheme". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, nr 2 (10.04.2021): 3189–98. http://dx.doi.org/10.17762/turcomat.v12i2.2374.
Pełny tekst źródłaTeja, Penumantra Satya Sai, Mounika Lakshmi P i Vinay Kumar K. "A Secure Communication through Quantum Key Distribution Protocols". International Research Journal of Electronics and Computer Engineering 4, nr 3 (30.09.2018): 14. http://dx.doi.org/10.24178/irjece.2018.4.3.14.
Pełny tekst źródłaSabani, Maria E., Ilias K. Savvas i Georgia Garani. "Learning with Errors: A Lattice-Based Keystone of Post-Quantum Cryptography". Signals 5, nr 2 (13.04.2024): 216–43. http://dx.doi.org/10.3390/signals5020012.
Pełny tekst źródłaDabola, Shashank. "Chat Secure-Messaging Application Based on Secure Encryption Algorithm". International Journal for Research in Applied Science and Engineering Technology 12, nr 3 (31.03.2024): 303–5. http://dx.doi.org/10.22214/ijraset.2024.58817.
Pełny tekst źródłaSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications". Mathematical Statistician and Engineering Applications 70, nr 1 (31.01.2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Pełny tekst źródłaDubey, Praveer, i Ompal Yadav. "A Survey on Quantum cryptography versus classical Cryptography". International Journal of Current Engineering and Technology 10, nr 06 (31.10.2021): 910–13. http://dx.doi.org/10.14741/ijcet/v.10.6.3.
Pełny tekst źródłaAkram, Zaryab. "Cryptology Based on Laplace Transform of Hyperbolic Function and Matrix Decomposition Method". ECS Meeting Abstracts MA2022-02, nr 64 (9.10.2022): 2364. http://dx.doi.org/10.1149/ma2022-02642364mtgabs.
Pełny tekst źródłaChandre, Pankaj R., Bhagyashree D. Shendkar, Sayalee Deshmukh, Sameer Kakade i Suvarna Potdukhe. "Machine Learning-Enhanced Advancements in Quantum Cryptography: A Comprehensive Review and Future Prospects". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 11s (10.10.2023): 642–55. http://dx.doi.org/10.17762/ijritcc.v11i11s.8300.
Pełny tekst źródłaShah, Aayush, Prabhat Mahato i Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm". International Journal for Research in Applied Science and Engineering Technology 11, nr 8 (31.08.2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Pełny tekst źródłaBala, Romi, i Hemant Pandey. "Advances in Discrete Mathematics: From Combinatorics to Cryptography". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, nr 3 (13.12.2019): 1643–46. http://dx.doi.org/10.61841/turcomat.v10i3.14624.
Pełny tekst źródłaSedat Sonko, Kenneth Ifeanyi Ibekwe, Valentine Ikenna Ilojianya, Emmanuel Augustine Etukudoh i Adefunke Fabuyide. "QUANTUM CRYPTOGRAPHY AND U.S. DIGITAL SECURITY: A COMPREHENSIVE REVIEW: INVESTIGATING THE POTENTIAL OF QUANTUM TECHNOLOGIES IN CREATING UNBREAKABLE ENCRYPTION AND THEIR FUTURE IN NATIONAL SECURITY". Computer Science & IT Research Journal 5, nr 2 (18.02.2024): 390–414. http://dx.doi.org/10.51594/csitrj.v5i2.790.
Pełny tekst źródłaDhakne, Dr Amol, Prasann Shimpi, Sanket Halake, Shivam Dharmshetti i Shashank Singh. "Neural Network Based Message Concealment Scheme". International Journal for Research in Applied Science and Engineering Technology 10, nr 5 (31.05.2022): 1368–78. http://dx.doi.org/10.22214/ijraset.2022.42522.
Pełny tekst źródłaPriya, R. Shanmuga, i A. Senthilkumar. "A Study on Visual Cryptography for Colour Images". International Journal of Advanced Research in Computer Science and Software Engineering 7, nr 7 (1.08.2017): 260. http://dx.doi.org/10.23956/ijarcsse/v7i7/0172.
Pełny tekst źródłaKaushal, Milind. "Cryptography: A Brief Review". International Journal for Research in Applied Science and Engineering Technology 10, nr 2 (28.02.2022): 763–67. http://dx.doi.org/10.22214/ijraset.2022.40401.
Pełny tekst źródłaWang, Xing, Qiang Zhang i Xiao Peng Wei. "A New Encryption Method Based on Rijndael Algorithm and DNA Computing". Applied Mechanics and Materials 20-23 (styczeń 2010): 1241–46. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1241.
Pełny tekst źródłaSankhyan, Bhanu. "Review on Symmetric and Asymmetric Cryptography". International Journal for Research in Applied Science and Engineering Technology 12, nr 3 (31.03.2024): 2934–40. http://dx.doi.org/10.22214/ijraset.2024.59538.
Pełny tekst źródłaAbbasi, Faisal. "Quantum Cryptography: The Future of Internet and Security Management". Journal of Management and Service Science (JMSS) 1, nr 1 (2021): 1–12. http://dx.doi.org/10.54060/jmss/001.01.004.
Pełny tekst źródłaBharati A. Patil, Prajakta R. Toke i Sharyu S. Naiknavare. "Research on Various Cryptography Techniques". International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, nr 2 (22.04.2024): 685–92. http://dx.doi.org/10.32628/cseit2410290.
Pełny tekst źródłaGeetha, M., i K. Akila. "SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS". IJISCS (International Journal of Information System and Computer Science) 2, nr 3 (14.03.2019): 123. http://dx.doi.org/10.56327/ijiscs.v2i3.708.
Pełny tekst źródłaB S, Aditya, i Sharadadevi Kaganurmath. "Use of Cryptography and Signing for Network Security". International Journal for Research in Applied Science and Engineering Technology 10, nr 7 (31.07.2022): 4080–83. http://dx.doi.org/10.22214/ijraset.2022.45926.
Pełny tekst źródłaSabaya, Dinaeli Paul, Adam Aloyce Semlambo i Joel Kazoba Simon. "Data Security Through Crypto-Stegano Systems". International Journal of Computational Science, Information Technology and Control Engineering 10, nr 1/2/3 (27.07.2023): 1–23. http://dx.doi.org/10.5121/ijcsitce.2023.10301.
Pełny tekst źródłaRani, Rashmi. "Quantum Cryptography: Fundamentals and Advanced Techniques". International Journal for Research in Applied Science and Engineering Technology 12, nr 5 (31.05.2024): 5747–51. http://dx.doi.org/10.22214/ijraset.2024.62943.
Pełny tekst źródłaNana, Nana, i Puguh Wahyu Prasetyo. "An implementation of Hill cipher and 3x3x3 rubik's cube to enhance communication security". Bulletin of Applied Mathematics and Mathematics Education 1, nr 2 (10.12.2021): 75–92. http://dx.doi.org/10.12928/bamme.v1i2.4252.
Pełny tekst źródłaVignesh, R. Sakthi, S. Sudharssun i K. J. Jegadish kumar. "Contemporary Cryptography and Arguments for Classical Cryptography's Endurance alongside the Propitious Quantum Cryptography". International Journal of Computer Applications 1, nr 26 (25.02.2010): 59–64. http://dx.doi.org/10.5120/479-786.
Pełny tekst źródłaViresh, Kasheenath Babaleshwar, Karade Sinchana, N. Sakshi i Naidu Anush. "Audio encryption and decryption using AES algorithm technique". i-manager’s Journal on Electronics Engineering 14, nr 2 (2024): 8. http://dx.doi.org/10.26634/jele.14.2.20486.
Pełny tekst źródłaIrawan, Muhammad Dedi. "IMPLEMENTASI KRIPTOGRAFI VIGENERE CIPHER DENGAN PHP". JURNAL TEKNOLOGI INFORMASI 1, nr 1 (1.06.2017): 11. http://dx.doi.org/10.36294/jurti.v1i1.21.
Pełny tekst źródłaDrzazga, Bartosz, i Łukasz Krzywiecki. "Review of Chosen Isogeny-Based Cryptographic Schemes". Cryptography 6, nr 2 (31.05.2022): 27. http://dx.doi.org/10.3390/cryptography6020027.
Pełny tekst źródłaTama, Yanuar Bhakti Wira, i Muhammad Firdhausi Fahmi. "Sistem Kriptografi Klasik Dengan Memanfaatkan Orde Dari Grup Titik Pada Kurva Eliptik Bentuk Montgomery". Euler : Jurnal Ilmiah Matematika, Sains dan Teknologi 11, nr 2 (16.12.2023): 361–71. http://dx.doi.org/10.37905/euler.v11i2.23009.
Pełny tekst źródłaYalla, Surya Prakash, Archana Uriti, Abhisek Sethy i Sathishkumar V. E. "Secure method of communication using Quantum Key Distribution". Applied and Computational Engineering 30, nr 1 (22.01.2024): 32–37. http://dx.doi.org/10.54254/2755-2721/30/20230065.
Pełny tekst źródłaLiang, Yuheng. "A research on applications of neural network-based cryptography". Applied and Computational Engineering 14, nr 1 (23.10.2023): 258–64. http://dx.doi.org/10.54254/2755-2721/14/20230798.
Pełny tekst źródłaDarko, Cyprian Danso. "Data Security in the Cloud Using Multi-Modal Bio-Cryptographic Authentication". Advances in Multidisciplinary and scientific Research Journal Publication 10, nr 4 (30.11.2022): 9–14. http://dx.doi.org/10.22624/aims/digital/v10n4p2.
Pełny tekst źródłaOsorio, Julian, Carlos Trujillo i Diego Ruiz. "Construction of a cryptographic function based on Bose-type Sidon sets". AIMS Mathematics 9, nr 7 (2024): 17590–605. http://dx.doi.org/10.3934/math.2024855.
Pełny tekst źródłaManap, Abusaid, Gulnar Abitova, Gulzhan Uskenbayeva i Aigul Shaikhanova. "DESIGN OF TECHNOLOGY FOR SECURE FILE STORAGE BASED ON HYBRID CRYPTOGRAPHY METHODS: SHORT OVERVIEW". Вестник КазАТК 129, nr 6 (22.12.2023): 205–15. http://dx.doi.org/10.52167/1609-1817-2023-129-6-205-215.
Pełny tekst źródłaFeltovic, Milan. "FROM THEORY TO PRACTICE: THE ROLE OF CRYPTOGRAPHY IN SECURING BLOCKCHAIN NETWORKS". MEST Journal 12, nr 2 (15.07.2024): 93–102. http://dx.doi.org/10.12709/mest.12.12.02.12.
Pełny tekst źródłaGil Molk, Ali Mohammad Norouzzadeh, Mohammad Reza Aref i Reza Ramazani Khorshiddoust. "Analysis of design goals of cryptography algorithms based on different components". Indonesian Journal of Electrical Engineering and Computer Science 23, nr 1 (1.07.2021): 540. http://dx.doi.org/10.11591/ijeecs.v23.i1.pp540-548.
Pełny tekst źródłaDanoyan, D. H. "EXTENDING WHITE-BOX CRYPTOGRAPHY BASED OBLIVIOUS TRANSFER PROTOCOL". Proceedings of the YSU A: Physical and Mathematical Sciences 50, nr 1 (239) (18.03.2016): 40–44. http://dx.doi.org/10.46991/psyu:a/2016.50.1.040.
Pełny tekst źródłaZHANG, YU. "The computational SLR: a logic for reasoning about computational indistinguishability". Mathematical Structures in Computer Science 20, nr 5 (październik 2010): 951–75. http://dx.doi.org/10.1017/s0960129510000265.
Pełny tekst źródła