Artigos de revistas sobre o tema "Cryptography"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Cryptography".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Yan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)". Journal of Physics: Conference Series 2386, n.º 1 (1 de dezembro de 2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Texto completo da fonteGoldreich, Oded. "Cryptography and cryptographic protocols". Distributed Computing 16, n.º 2-3 (1 de setembro de 2003): 177–99. http://dx.doi.org/10.1007/s00446-002-0077-1.
Texto completo da fonteAnilkumar, Chunduru, Bhavani Gorle e Kinthali Sowmya. "A Secure Method of Communication in Conventional Cryptography using Quantum Key Distribution". Applied and Computational Engineering 8, n.º 1 (1 de agosto de 2023): 68–73. http://dx.doi.org/10.54254/2755-2721/8/20230083.
Texto completo da fonteRusetskaya, Irina A. "CRYPTOGRAPHY. FROM THE PAST TO THE FUTURE". RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, n.º 4 (2021): 47–57. http://dx.doi.org/10.28995/2686-679x-2021-4-47-57.
Texto completo da fonteGoyal, Rohit. "Quantum Cryptography: Secure Communication Beyond Classical Limits". Journal of Quantum Science and Technology 1, n.º 1 (31 de março de 2024): 1–5. http://dx.doi.org/10.36676/jqst.v1.i1.01.
Texto completo da fonteVictor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat e Abdullayeva Shakhzoda. "Cryptography: Advances in Secure Communication and Data Protection". E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.
Texto completo da fonteAnilkumar, Chunduru, Swathi Lenka, N. Neelima e Sathishkumar V E. "A Secure Method of Communication Through BB84 Protocol in Quantum Key Distribution". Scalable Computing: Practice and Experience 25, n.º 1 (4 de janeiro de 2024): 21–33. http://dx.doi.org/10.12694/scpe.v25i1.2152.
Texto completo da fonteWANG, XINGYUAN, MING LIU e NINI GU. "TWO NEW CHAOTIC CRYPTOGRAPHIES BASED ON DIFFERENT ATTRACTOR-PARTITION ALGORITHMS". International Journal of Modern Physics B 21, n.º 27 (30 de outubro de 2007): 4739–50. http://dx.doi.org/10.1142/s0217979207038071.
Texto completo da fonteShashi Raj K. "The Intersection of Algebra and Cryptography: Enhancing Information Security through Mathematical Foundations". Communications on Applied Nonlinear Analysis 31, n.º 4s (5 de julho de 2024): 466–89. http://dx.doi.org/10.52783/cana.v31.943.
Texto completo da fonteYadav, Sonam. "An Extensive Study on Lattice-Based Cryptography and its Applications for RLWE-Based Problems". Universal Research Reports 10, n.º 3 (2023): 104–10. http://dx.doi.org/10.36676/urr.2023-v10i3-014.
Texto completo da fonteOh, Chaerin, Woosang Im, Hyunil Kim e Changho Seo. "Recent Trends in Cryptanalysis Techniques for White-box Block Ciphers". Korean Institute of Smart Media 12, n.º 9 (30 de outubro de 2023): 9–18. http://dx.doi.org/10.30693/smj.2023.12.9.9.
Texto completo da fonteBAFTIU, Naim. "Analysis and use of Cryptography techniques in programming language C#: Coding and Decoding". PRIZREN SOCIAL SCIENCE JOURNAL 4, n.º 3 (31 de dezembro de 2020): 1–10. http://dx.doi.org/10.32936/pssj.v4i3.165.
Texto completo da fonteVirk, Udayveer Singh, Devansh Verma, Gagandeep Singh e Prof Sheetal Laroiya Prof. Sheetal Laroiya. "Analyzing Cryptographic Techniques and Machine Learning Algorithms for Crime Prediction". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 10 (22 de outubro de 2024): 1–6. http://dx.doi.org/10.55041/ijsrem38099.
Texto completo da fonteHammad, Baraa Tareq, Ali Maki Sagheer, Ismail Taha Ahmed e Norziana Jamil. "A comparative review on symmetric and asymmetric DNA-based cryptography". Bulletin of Electrical Engineering and Informatics 9, n.º 6 (1 de dezembro de 2020): 2484–91. http://dx.doi.org/10.11591/eei.v9i6.2470.
Texto completo da fonteKumar,, Varun. "Challenges and Future Trends of Cryptography in Internet of Things". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 04 (10 de abril de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30505.
Texto completo da fonteEt. al., Mandru Manisha,. "Colour Visual Cryptography (3,3) Scheme". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n.º 2 (10 de abril de 2021): 3189–98. http://dx.doi.org/10.17762/turcomat.v12i2.2374.
Texto completo da fonteTeja, Penumantra Satya Sai, Mounika Lakshmi P e Vinay Kumar K. "A Secure Communication through Quantum Key Distribution Protocols". International Research Journal of Electronics and Computer Engineering 4, n.º 3 (30 de setembro de 2018): 14. http://dx.doi.org/10.24178/irjece.2018.4.3.14.
Texto completo da fonteSabani, Maria E., Ilias K. Savvas e Georgia Garani. "Learning with Errors: A Lattice-Based Keystone of Post-Quantum Cryptography". Signals 5, n.º 2 (13 de abril de 2024): 216–43. http://dx.doi.org/10.3390/signals5020012.
Texto completo da fonteDabola, Shashank. "Chat Secure-Messaging Application Based on Secure Encryption Algorithm". International Journal for Research in Applied Science and Engineering Technology 12, n.º 3 (31 de março de 2024): 303–5. http://dx.doi.org/10.22214/ijraset.2024.58817.
Texto completo da fonteAnnu. "Algebraic Structures and Their Applications in Modern Cryptography". Innovative Research Thoughts 10, n.º 3 (25 de julho de 2024): 52–59. http://dx.doi.org/10.36676/irt.v10.i3.1433.
Texto completo da fonteSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications". Mathematical Statistician and Engineering Applications 70, n.º 1 (31 de janeiro de 2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Texto completo da fonteKhamalwa, Mulemi Simiyu. "Exploring how Commutative Algebra Underpins Cryptographic Protocols and Encryption Methods Used in Secure Communications and Data Protection". NEWPORT INTERNATIONAL JOURNAL OF SCIENTIFIC AND EXPERIMENTAL SCIENCES 5, n.º 3 (14 de junho de 2024): 58–62. http://dx.doi.org/10.59298/nijses/2024/10.5.586237.
Texto completo da fonteDubey, Praveer, e Ompal Yadav. "A Survey on Quantum cryptography versus classical Cryptography". International Journal of Current Engineering and Technology 10, n.º 06 (31 de outubro de 2021): 910–13. http://dx.doi.org/10.14741/ijcet/v.10.6.3.
Texto completo da fonteAkram, Zaryab. "Cryptology Based on Laplace Transform of Hyperbolic Function and Matrix Decomposition Method". ECS Meeting Abstracts MA2022-02, n.º 64 (9 de outubro de 2022): 2364. http://dx.doi.org/10.1149/ma2022-02642364mtgabs.
Texto completo da fonteChandre, Pankaj R., Bhagyashree D. Shendkar, Sayalee Deshmukh, Sameer Kakade e Suvarna Potdukhe. "Machine Learning-Enhanced Advancements in Quantum Cryptography: A Comprehensive Review and Future Prospects". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 11s (10 de outubro de 2023): 642–55. http://dx.doi.org/10.17762/ijritcc.v11i11s.8300.
Texto completo da fonteShah, Aayush, Prabhat Mahato e Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm". International Journal for Research in Applied Science and Engineering Technology 11, n.º 8 (31 de agosto de 2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Texto completo da fonteBala, Romi, e Hemant Pandey. "Advances in Discrete Mathematics: From Combinatorics to Cryptography". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, n.º 3 (13 de dezembro de 2019): 1643–46. http://dx.doi.org/10.61841/turcomat.v10i3.14624.
Texto completo da fonteSedat Sonko, Kenneth Ifeanyi Ibekwe, Valentine Ikenna Ilojianya, Emmanuel Augustine Etukudoh e Adefunke Fabuyide. "QUANTUM CRYPTOGRAPHY AND U.S. DIGITAL SECURITY: A COMPREHENSIVE REVIEW: INVESTIGATING THE POTENTIAL OF QUANTUM TECHNOLOGIES IN CREATING UNBREAKABLE ENCRYPTION AND THEIR FUTURE IN NATIONAL SECURITY". Computer Science & IT Research Journal 5, n.º 2 (18 de fevereiro de 2024): 390–414. http://dx.doi.org/10.51594/csitrj.v5i2.790.
Texto completo da fonteDhakne, Dr Amol, Prasann Shimpi, Sanket Halake, Shivam Dharmshetti e Shashank Singh. "Neural Network Based Message Concealment Scheme". International Journal for Research in Applied Science and Engineering Technology 10, n.º 5 (31 de maio de 2022): 1368–78. http://dx.doi.org/10.22214/ijraset.2022.42522.
Texto completo da fonteOlajide Soji Osundare, Chidiebere Somadina Ike, Ololade Gilbert Fakeyede e Adebimpe Bolatito Ige. "Blockchain and quantum cryptography: Future of secure telecommunications in banking". Engineering Science & Technology Journal 3, n.º 2 (30 de dezembro de 2022): 154–71. http://dx.doi.org/10.51594/estj.v3i2.1523.
Texto completo da fontePriya, R. Shanmuga, e A. Senthilkumar. "A Study on Visual Cryptography for Colour Images". International Journal of Advanced Research in Computer Science and Software Engineering 7, n.º 7 (1 de agosto de 2017): 260. http://dx.doi.org/10.23956/ijarcsse/v7i7/0172.
Texto completo da fonteKaushal, Milind. "Cryptography: A Brief Review". International Journal for Research in Applied Science and Engineering Technology 10, n.º 2 (28 de fevereiro de 2022): 763–67. http://dx.doi.org/10.22214/ijraset.2022.40401.
Texto completo da fonteWang, Xing, Qiang Zhang e Xiao Peng Wei. "A New Encryption Method Based on Rijndael Algorithm and DNA Computing". Applied Mechanics and Materials 20-23 (janeiro de 2010): 1241–46. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1241.
Texto completo da fonteSankhyan, Bhanu. "Review on Symmetric and Asymmetric Cryptography". International Journal for Research in Applied Science and Engineering Technology 12, n.º 3 (31 de março de 2024): 2934–40. http://dx.doi.org/10.22214/ijraset.2024.59538.
Texto completo da fonteAbbasi, Faisal. "Quantum Cryptography: The Future of Internet and Security Management". Journal of Management and Service Science (JMSS) 1, n.º 1 (2021): 1–12. http://dx.doi.org/10.54060/jmss/001.01.004.
Texto completo da fonteBharati A. Patil, Prajakta R. Toke e Sharyu S. Naiknavare. "Research on Various Cryptography Techniques". International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, n.º 2 (22 de abril de 2024): 685–92. http://dx.doi.org/10.32628/cseit2410290.
Texto completo da fonteGeetha, M., e K. Akila. "SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS". IJISCS (International Journal of Information System and Computer Science) 2, n.º 3 (14 de março de 2019): 123. http://dx.doi.org/10.56327/ijiscs.v2i3.708.
Texto completo da fonteB S, Aditya, e Sharadadevi Kaganurmath. "Use of Cryptography and Signing for Network Security". International Journal for Research in Applied Science and Engineering Technology 10, n.º 7 (31 de julho de 2022): 4080–83. http://dx.doi.org/10.22214/ijraset.2022.45926.
Texto completo da fonteSabaya, Dinaeli Paul, Adam Aloyce Semlambo e Joel Kazoba Simon. "Data Security Through Crypto-Stegano Systems". International Journal of Computational Science, Information Technology and Control Engineering 10, n.º 1/2/3 (27 de julho de 2023): 1–23. http://dx.doi.org/10.5121/ijcsitce.2023.10301.
Texto completo da fonteNana, Nana, e Puguh Wahyu Prasetyo. "An implementation of Hill cipher and 3x3x3 rubik's cube to enhance communication security". Bulletin of Applied Mathematics and Mathematics Education 1, n.º 2 (10 de dezembro de 2021): 75–92. http://dx.doi.org/10.12928/bamme.v1i2.4252.
Texto completo da fonteRani, Rashmi. "Quantum Cryptography: Fundamentals and Advanced Techniques". International Journal for Research in Applied Science and Engineering Technology 12, n.º 5 (31 de maio de 2024): 5747–51. http://dx.doi.org/10.22214/ijraset.2024.62943.
Texto completo da fonteVignesh, R. Sakthi, S. Sudharssun e K. J. Jegadish kumar. "Contemporary Cryptography and Arguments for Classical Cryptography's Endurance alongside the Propitious Quantum Cryptography". International Journal of Computer Applications 1, n.º 26 (25 de fevereiro de 2010): 59–64. http://dx.doi.org/10.5120/479-786.
Texto completo da fonteLohith D K e Sanjay M. "A system of symmetric key cryptography using deep learning". Global Journal of Engineering and Technology Advances 20, n.º 2 (30 de agosto de 2024): 081–89. http://dx.doi.org/10.30574/gjeta.2024.20.2.0139.
Texto completo da fonteViresh, Kasheenath Babaleshwar, Karade Sinchana, N. Sakshi e Naidu Anush. "Audio encryption and decryption using AES algorithm technique". i-manager’s Journal on Electronics Engineering 14, n.º 2 (2024): 8. http://dx.doi.org/10.26634/jele.14.2.20486.
Texto completo da fonteDrzazga, Bartosz, e Łukasz Krzywiecki. "Review of Chosen Isogeny-Based Cryptographic Schemes". Cryptography 6, n.º 2 (31 de maio de 2022): 27. http://dx.doi.org/10.3390/cryptography6020027.
Texto completo da fonteIrawan, Muhammad Dedi. "IMPLEMENTASI KRIPTOGRAFI VIGENERE CIPHER DENGAN PHP". JURNAL TEKNOLOGI INFORMASI 1, n.º 1 (1 de junho de 2017): 11. http://dx.doi.org/10.36294/jurti.v1i1.21.
Texto completo da fonteYalla, Surya Prakash, Archana Uriti, Abhisek Sethy e Sathishkumar V. E. "Secure method of communication using Quantum Key Distribution". Applied and Computational Engineering 30, n.º 1 (22 de janeiro de 2024): 32–37. http://dx.doi.org/10.54254/2755-2721/30/20230065.
Texto completo da fonteTama, Yanuar Bhakti Wira, e Muhammad Firdhausi Fahmi. "Sistem Kriptografi Klasik Dengan Memanfaatkan Orde Dari Grup Titik Pada Kurva Eliptik Bentuk Montgomery". Euler : Jurnal Ilmiah Matematika, Sains dan Teknologi 11, n.º 2 (16 de dezembro de 2023): 361–71. http://dx.doi.org/10.37905/euler.v11i2.23009.
Texto completo da fonteLiang, Yuheng. "A research on applications of neural network-based cryptography". Applied and Computational Engineering 14, n.º 1 (23 de outubro de 2023): 258–64. http://dx.doi.org/10.54254/2755-2721/14/20230798.
Texto completo da fonteDarko, Cyprian Danso. "Data Security in the Cloud Using Multi-Modal Bio-Cryptographic Authentication". Advances in Multidisciplinary and scientific Research Journal Publication 10, n.º 4 (30 de novembro de 2022): 9–14. http://dx.doi.org/10.22624/aims/digital/v10n4p2.
Texto completo da fonte