Literatura científica selecionada sobre o tema "Cryptography"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Cryptography".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Cryptography"
Yan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)". Journal of Physics: Conference Series 2386, n.º 1 (1 de dezembro de 2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Texto completo da fonteGoldreich, Oded. "Cryptography and cryptographic protocols". Distributed Computing 16, n.º 2-3 (1 de setembro de 2003): 177–99. http://dx.doi.org/10.1007/s00446-002-0077-1.
Texto completo da fonteAnilkumar, Chunduru, Bhavani Gorle e Kinthali Sowmya. "A Secure Method of Communication in Conventional Cryptography using Quantum Key Distribution". Applied and Computational Engineering 8, n.º 1 (1 de agosto de 2023): 68–73. http://dx.doi.org/10.54254/2755-2721/8/20230083.
Texto completo da fonteRusetskaya, Irina A. "CRYPTOGRAPHY. FROM THE PAST TO THE FUTURE". RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, n.º 4 (2021): 47–57. http://dx.doi.org/10.28995/2686-679x-2021-4-47-57.
Texto completo da fonteGoyal, Rohit. "Quantum Cryptography: Secure Communication Beyond Classical Limits". Journal of Quantum Science and Technology 1, n.º 1 (31 de março de 2024): 1–5. http://dx.doi.org/10.36676/jqst.v1.i1.01.
Texto completo da fonteVictor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat e Abdullayeva Shakhzoda. "Cryptography: Advances in Secure Communication and Data Protection". E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.
Texto completo da fonteAnilkumar, Chunduru, Swathi Lenka, N. Neelima e Sathishkumar V E. "A Secure Method of Communication Through BB84 Protocol in Quantum Key Distribution". Scalable Computing: Practice and Experience 25, n.º 1 (4 de janeiro de 2024): 21–33. http://dx.doi.org/10.12694/scpe.v25i1.2152.
Texto completo da fonteWANG, XINGYUAN, MING LIU e NINI GU. "TWO NEW CHAOTIC CRYPTOGRAPHIES BASED ON DIFFERENT ATTRACTOR-PARTITION ALGORITHMS". International Journal of Modern Physics B 21, n.º 27 (30 de outubro de 2007): 4739–50. http://dx.doi.org/10.1142/s0217979207038071.
Texto completo da fonteShashi Raj K. "The Intersection of Algebra and Cryptography: Enhancing Information Security through Mathematical Foundations". Communications on Applied Nonlinear Analysis 31, n.º 4s (5 de julho de 2024): 466–89. http://dx.doi.org/10.52783/cana.v31.943.
Texto completo da fonteYadav, Sonam. "An Extensive Study on Lattice-Based Cryptography and its Applications for RLWE-Based Problems". Universal Research Reports 10, n.º 3 (2023): 104–10. http://dx.doi.org/10.36676/urr.2023-v10i3-014.
Texto completo da fonteTeses / dissertações sobre o assunto "Cryptography"
Poschmann, Axel York. "Lightweight cryptography cryptographic engineering for a pervasive world". Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2009. http://d-nb.info/996578153/04.
Texto completo da fonteAlmeida, Braga Daniel de. "Cryptography in the wild : the security of cryptographic implementations". Thesis, Rennes 1, 2022. http://www.theses.fr/2022REN1S067.
Texto completo da fonteSide-channel attacks are daunting for cryptographic implementations. Despite past attacks, and the proliferation of verification tools, these attacks still affect many implementations. In this manuscript, we address two aspects of this problem, centered around attack and defense. We unveil several microarchitectural side-channel attacks on implementations of PAKE protocols. In particular, we exposed attacks on Dragonfly, used in the new Wi-Fi standard WPA3, and SRP, deployed in many software such as ProtonMail or Apple HomeKit. We also explored the lack of use by developers of tools to detect such attacks. We questioned developers from various cryptographic projects to identify the origin of this lack. From their answers, we issued recommendations. Finally, in order to stop the spiral of attack-patch on Dragonfly implementations, we provide a formally verified implementation of the cryptographic layer of the protocol, whose execution is secret-independent
Yerushalmi, Yoav. "Incremental cryptography". Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42789.
Texto completo da fonteIncludes bibliographical references (leaves 147-148).
by Yoav Yerushalmi.
M.Eng.
Shamonin, K. E. "Quantum cryptography". Thesis, Sumy State University, 2018. http://essuir.sumdu.edu.ua/handle/123456789/66837.
Texto completo da fonteLopez, Samuel. "MODERN CRYPTOGRAPHY". CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/729.
Texto completo da fonteMinaud, Brice. "Analyse de primitives cryptographiques récentes". Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1S066/document.
Texto completo da fonteIn this thesis, we study the security of some recent cryptographic primitives, both symmetric and asymmetric. Along the way we also consider white-box primitives, which may be regarded as a middle ground between symmetric and asymmetric cryptography. We begin by showing the existence of non-trivial linear maps commuting with the round function of some recent block cipher designs, which give rise to self-similarity and invariant subspace attacks. We then move on to the structural cryptanalysis of ASASA schemes, where nonlinear layers S alternate with affine layers A. Our structural cryptanalysis applies to symmetric, multivariate, as well as white-box instances. Focusing on the white-box model of incompressibility, we then build an efficient block cipher and key generator that offer provable security guarantees. Finally, on the purely asymmetric side, we describe a polynomial attack against a recent multilinear map proposal
PRIYADHARSHINI, THIRUTHUVADOSS ANGELINE. "Comparison and Performance Evaluation of Modern Cryptography and DNA Cryptography". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-120103.
Texto completo da fonteNyman, Ellinor. "Cryptography : A study of modern cryptography and its mathematical methods". Thesis, Uppsala universitet, Analys och sannolikhetsteori, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-447460.
Texto completo da fonteIdrees, Zunera. "Elliptic Curves Cryptography". Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17544.
Texto completo da fonteRoe, Michael Robert. "Cryptography and evidence". Thesis, University of Cambridge, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.627396.
Texto completo da fonteLivros sobre o assunto "Cryptography"
Stinson, Douglas R., e Maura B. Paterson. Cryptography. Fourth edition. | Boca Raton : CRC Press, Taylor & Francis: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9781315282497.
Texto completo da fonteRubinstein-Salzedo, Simon. Cryptography. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94818-8.
Texto completo da fonteSlayton, Rebecca, ed. Democratizing Cryptography. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3549993.
Texto completo da fonteFranklin, Matthew, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48390-x.
Texto completo da fonteOmondi, Amos R. Cryptography Arithmetic. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-34142-8.
Texto completo da fonteEasttom, William. Modern Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63115-4.
Texto completo da fonteHirschfeld, Rafael, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-63594-7.
Texto completo da fonteHirchfeld, Rafael, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0055468.
Texto completo da fonteFerguson, Niels, Bruce Schneier e Tadayoshi Kohno. Cryptography Engineering. Indianapolis, Indiana: Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781118722367.
Texto completo da fonteBlaze, Matt, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36504-4.
Texto completo da fonteCapítulos de livros sobre o assunto "Cryptography"
Hofheinz, Dennis, e Eike Kiltz. "Scalable Cryptography". In Lecture Notes in Computer Science, 169–78. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-21534-6_9.
Texto completo da fonteBuchmann, Johannes. "Sustainable Cryptography". In International Symposium on Mathematics, Quantum Theory, and Cryptography, 3. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5191-8_1.
Texto completo da fonteHardy, Yorick, e Willi-Hans Steeb. "Cryptography". In Classical and Quantum Computing, 215–28. Basel: Birkhäuser Basel, 2001. http://dx.doi.org/10.1007/978-3-0348-8366-5_11.
Texto completo da fonteWallis, W. D. "Cryptography". In Mathematics in the Real World, 157–67. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-8529-2_11.
Texto completo da fonteO’Regan, Gerard. "Cryptography". In Texts in Computer Science, 155–70. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44561-8_10.
Texto completo da fonteKoblitz, Neal. "Cryptography". In Mathematics Unlimited — 2001 and Beyond, 749–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/978-3-642-56478-9_38.
Texto completo da fonteKizza, Joseph Migga. "Cryptography". In Guide to Computer Network Security, 225–48. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_11.
Texto completo da fonteCorsini, Piergiulio, e Violeta Leoreanu. "Cryptography". In Applications of Hyperstructure Theory, 247–56. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4757-3714-1_8.
Texto completo da fonteHansmann, Uwe, Martin S. Nicklous, Thomas Schäck e Frank Seliger. "Cryptography". In Smart Card Application Development Using Java, 49–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-642-98052-7_4.
Texto completo da fonteNorberg, Scott. "Cryptography". In Advanced ASP.NET Core 3 Security, 57–101. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6014-2_3.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Cryptography"
Jovanović, Boriša, Ivan Tot e Silvana Ilić. "Contemporary cryptography: Recent achievement and research perspectives". In 11th International Scientific Conference on Defensive Technologies - OTEX 2024, 376–80. Military Technical Institute, Belgrade, 2024. http://dx.doi.org/10.5937/oteh24067j.
Texto completo da fonteSlutsky, Boris A., R. Rao, L. Tancevski, P. C. Sun e Y. Fainman. "Information Leakage Estimates in Quantum Cryptography". In Optics in Computing. Washington, D.C.: Optica Publishing Group, 1997. http://dx.doi.org/10.1364/oc.1997.owc.2.
Texto completo da fonteFaz-Hernández, Armando, e Julio López. "High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves". In Concurso de Teses e Dissertações. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/ctd.2023.230156.
Texto completo da fonteFaz-Hernandez, Armando, e Julio López. "High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves". In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais, 49–56. Sociedade Brasileira de Computação - SBC, 2024. http://dx.doi.org/10.5753/sbseg_estendido.2024.241959.
Texto completo da fonteDuta, Cristinaloredana, e Laura Gheorghe. "ELEARNING FRAMEWORK FOR UNDERSTANDING CRYPTOGRAPHY AT ALL LEVELS". In eLSE 2015. Carol I National Defence University Publishing House, 2015. http://dx.doi.org/10.12753/2066-026x-15-026.
Texto completo da fonteЛацин, Семен Михайлович, e Наталья Александровна Борсук. "ANALYSIS OF ELLIPTICAL CRYPTOGRAPHY ON THE EXAMPLE OF THE BITCOIN BLOCKCHAIN". In Методики фундаментальных и прикладных научных исследований: сборник статей всероссийской научной конференции (Санкт-Петербург, Декабрь 2022). Crossref, 2023. http://dx.doi.org/10.37539/221223.2022.83.11.008.
Texto completo da fonteBraga, Alexandre, e Ricardo Dahab. "A Longitudinal and Retrospective Study on How Developers Misuse Cryptography in Online Communities". In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/sbseg.2017.19488.
Texto completo da fonteRodrigues, Gustavo Eloi de P., Alexandre M. Braga e Ricardo Dahab. "A machine learning approach to detect misuse of cryptographic APIs in source code". In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19223.
Texto completo da fonte"Medical Image Security Using Quantum Cryptography". In InSITE 2018: Informing Science + IT Education Conferences: La Verne California. Informing Science Institute, 2018. http://dx.doi.org/10.28945/3968.
Texto completo da fonteOrisaka, Gabriell, Diego F. Aranha e Julio López. "Finite Field Arithmetic Using AVX-512 For Isogeny-Based Cryptography". In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais, 385–92. Sociedade Brasileira de Computação - SBC, 2018. http://dx.doi.org/10.5753/sbseg.2018.4269.
Texto completo da fonteRelatórios de organizações sobre o assunto "Cryptography"
de Abreu, Jonas, e Mariana Cunha e Melo. Extending Pix: An approach to offline Dynamic QR Code generation. Center for Technology and Public Interest, SL, abril de 2023. http://dx.doi.org/10.59262/9qu6ex.
Texto completo da fonteNechvatal, James. Public-key cryptography. Gaithersburg, MD: National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.sp.800-2.
Texto completo da fonteMouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, julho de 2021. http://dx.doi.org/10.6028/nist.ir.8319.
Texto completo da fonteJonsson, J., e B. Kaliski. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. RFC Editor, fevereiro de 2003. http://dx.doi.org/10.17487/rfc3447.
Texto completo da fonteBlake-Wilson, S., D. Brown e P. Lambert. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). RFC Editor, abril de 2002. http://dx.doi.org/10.17487/rfc3278.
Texto completo da fonteTurner, S., e D. Brown. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). RFC Editor, janeiro de 2010. http://dx.doi.org/10.17487/rfc5753.
Texto completo da fonteDraelos, Timothy John, Mark Dolan Torgerson, William Douglas Neumann, Donald R. Gallup, Michael Joseph Collins e Cheryl Lynn Beaver. Hybrid cryptography key management. Office of Scientific and Technical Information (OSTI), novembro de 2003. http://dx.doi.org/10.2172/918318.
Texto completo da fonteMcKay, Kerry A., Larry Bassham, Meltem Sonmez Turan e Nicky Mouha. Report on lightweight cryptography. Gaithersburg, MD: National Institute of Standards and Technology, março de 2017. http://dx.doi.org/10.6028/nist.ir.8114.
Texto completo da fonteTorgerson, Mark Dolan, Timothy John Draelos, Richard Crabtree Schroeppel, Russell D. Miller e William Erik Anderson. Small circuits for cryptography. Office of Scientific and Technical Information (OSTI), outubro de 2005. http://dx.doi.org/10.2172/875977.
Texto completo da fonteMcGrew, D., K. Igoe e M. Salter. Fundamental Elliptic Curve Cryptography Algorithms. RFC Editor, fevereiro de 2011. http://dx.doi.org/10.17487/rfc6090.
Texto completo da fonte