Artigos de revistas sobre o tema "Secret-key cryptography"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Secret-key cryptography".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Liu, Shuiyin, Yi Hong e Emanuele Viterbo. "Unshared Secret Key Cryptography". IEEE Transactions on Wireless Communications 13, n.º 12 (dezembro de 2014): 6670–83. http://dx.doi.org/10.1109/twc.2014.2364022.
Texto completo da fonteNAGY, NAYA, MARIUS NAGY e SELIM G. AKL. "KEY DISTRIBUTION VERSUS KEY ENHANCEMENT IN QUANTUM CRYPTOGRAPHY". Parallel Processing Letters 20, n.º 03 (setembro de 2010): 239–50. http://dx.doi.org/10.1142/s0129626410000193.
Texto completo da fonteJoye, Marc, e Sung-Ming Yen. "ID-based secret-key cryptography". ACM SIGOPS Operating Systems Review 32, n.º 4 (outubro de 1998): 33–39. http://dx.doi.org/10.1145/302350.302359.
Texto completo da fonteKak, S. C. "Secret-hardware public-key cryptography". IEE Proceedings E Computers and Digital Techniques 133, n.º 2 (1986): 94. http://dx.doi.org/10.1049/ip-e.1986.0010.
Texto completo da fonteMakeri, Yakubu Ajiji. "INTEGRATED CRYPTOGRAPHICAL ACCESS CONTROL OVER NETWORK PROJECT". Acta Informatica Malaysia 4, n.º 1 (18 de maio de 2020): 19–21. http://dx.doi.org/10.26480/aim.01.2020.19.21.
Texto completo da fonteDubey, Praveer, e Ompal Yadav. "A Survey on Quantum cryptography versus classical Cryptography". International Journal of Current Engineering and Technology 10, n.º 06 (31 de outubro de 2021): 910–13. http://dx.doi.org/10.14741/ijcet/v.10.6.3.
Texto completo da fonteBachman, Dale J., Ezra A. Brown e Anderson H. Norton. "Chocolate Key Cryptography". Mathematics Teacher 104, n.º 2 (setembro de 2010): 100–104. http://dx.doi.org/10.5951/mt.104.2.0100.
Texto completo da fonteBachman, Dale J., Ezra A. Brown e Anderson H. Norton. "Chocolate Key Cryptography". Mathematics Teacher 104, n.º 2 (setembro de 2010): 100–104. http://dx.doi.org/10.5951/mt.104.2.0100.
Texto completo da fonteAnilkumar, Chunduru, Swathi Lenka, N. Neelima e Sathishkumar V E. "A Secure Method of Communication Through BB84 Protocol in Quantum Key Distribution". Scalable Computing: Practice and Experience 25, n.º 1 (4 de janeiro de 2024): 21–33. http://dx.doi.org/10.12694/scpe.v25i1.2152.
Texto completo da fonteDayo Alowolodu, Olufunso, Gabriel K Adelaja, Boniface K Alese e Olufunke Catherine Olayemi. "Medical Image Security Using Quantum Cryptography". Issues in Informing Science and Information Technology 15 (2018): 057–67. http://dx.doi.org/10.28945/4008.
Texto completo da fonteMukhammadovich, Nurullaev Mirkhon, e Aloev Rakhmatillo Djuraevich. "Working with cryptographic key information". International Journal of Electrical and Computer Engineering (IJECE) 13, n.º 1 (1 de fevereiro de 2023): 911. http://dx.doi.org/10.11591/ijece.v13i1.pp911-919.
Texto completo da fonteSeredynski, Franciszek, Pascal Bouvry e Albert Y. Zomaya. "Cellular automata computations and secret key cryptography". Parallel Computing 30, n.º 5-6 (maio de 2004): 753–66. http://dx.doi.org/10.1016/j.parco.2003.12.014.
Texto completo da fonteZhang, Guoyan. "Secret Key-Awareness Secure in Certificateless Cryptography". Procedia Environmental Sciences 10 (2011): 633–39. http://dx.doi.org/10.1016/j.proenv.2011.09.102.
Texto completo da fonteI, Arshiya, e Sekar R. "Securing M2m Post-Quantum Secret Key Cryptography". IOSR Journal of Electronics and Communication Engineering 9, n.º 1 (2014): 22–27. http://dx.doi.org/10.9790/2834-09132227.
Texto completo da fonteOctora Ginting, Ferraro S., Veithzal Rivai Zainal e Aziz Hakim. "Digital Signature Standard Implementation Strategy by Optimizing Hash Functions Through Performance Optimization". Journal of Accounting and Finance Management 3, n.º 6 (19 de fevereiro de 2023): 362–71. http://dx.doi.org/10.38035/jafm.v3i6.175.
Texto completo da fonteMaram, Balajee, Y. Ramesh Kumar e K. Lakshmana Rao. "NARSKCA: Novel and robust symmetric key cryptography algorithm". International Journal of Scientific World 3, n.º 2 (5 de setembro de 2015): 244. http://dx.doi.org/10.14419/ijsw.v3i2.5111.
Texto completo da fonteAlqadi, Ziad. "Comparative Analysis of using SIK for Message Cryptography". International Journal of Computer Science and Mobile Computing 12, n.º 8 (30 de agosto de 2023): 45–57. http://dx.doi.org/10.47760/ijcsmc.2023.v12i08.006.
Texto completo da fonteGeetha, M., e K. Akila. "SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS". IJISCS (International Journal of Information System and Computer Science) 2, n.º 3 (14 de março de 2019): 123. http://dx.doi.org/10.56327/ijiscs.v2i3.708.
Texto completo da fonteTseng, Yuh–Min, Jui-Di Wu, Sen-Shan Huang e Tung-Tso Tsai. "Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server". Information Technology And Control 49, n.º 4 (19 de dezembro de 2020): 464–81. http://dx.doi.org/10.5755/j01.itc.49.4.25927.
Texto completo da fonteNong Phuong Trang e Luu Hong Dung. "A type of public - key block cipher algorithm". Journal of Military Science and Technology, CSCE7 (30 de dezembro de 2023): 50–60. http://dx.doi.org/10.54939/1859-1043.j.mst.csce7.2023.49-59.
Texto completo da fonteKaushik, Bharti, Vikas Malik e Vinod Saroha. "A Review Paper on Data Encryption and Decryption". International Journal for Research in Applied Science and Engineering Technology 11, n.º 4 (30 de abril de 2023): 1986–92. http://dx.doi.org/10.22214/ijraset.2023.50101.
Texto completo da fonteNovianti, Chofifah Alfin, Muhammad Khudzaifah e Mohammad Nafie Jauhari. "Kriptografi Hibrida Cipher Block Chaining (CBC) dan Merkle-Hellman Knapsack untuk Pengamanan Pesan Teks". Jurnal Riset Mahasiswa Matematika 3, n.º 1 (31 de outubro de 2023): 10–25. http://dx.doi.org/10.18860/jrmm.v3i1.22292.
Texto completo da fonteMankovskyy, S., e Yu Matiieshyn. "PYTHON MODEL OF SECRET KEY AGREEMENT IN THE GROUP OF ARBITRARY NUMBER OF PARTICIPANTS". Information and communication technologies, electronic engineering 4, n.º 1 (12 de maio de 2024): 93–101. http://dx.doi.org/10.23939/ictee2024.01.093.
Texto completo da fonteSasongko, Arif, Hidayat Hidayat, Yusuf Kurniawan e Sarwono Sutikno. "Architecture for the Secret-Key Bc3 Cryptography Algorithm". ITB Journal of Information and Communication Technology 5, n.º 2 (2011): 125–40. http://dx.doi.org/10.5614/itbj.ict.2011.5.2.4.
Texto completo da fonteNguyen, Thi-Nhung. "Privacy preserving using extended euclidean – algorithm applied to RSA". Tạp chí Khoa học - Trường Đại học Sư phạm Hà Nội 2 1, n.º 2 (28 de abril de 2023): 53–63. http://dx.doi.org/10.56764/hpu2.jos.2023.1.2.53-63.
Texto completo da fonteChen, Jingyu, Haitao Deng, Huachang Su, Minghao Yuan e Yongjun Ren. "Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey". Electronics 13, n.º 2 (8 de janeiro de 2024): 287. http://dx.doi.org/10.3390/electronics13020287.
Texto completo da fonteHuang, Jianye, Qiong Huang e Chunhua Pan. "A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting". International Journal of Foundations of Computer Science 28, n.º 06 (setembro de 2017): 761–80. http://dx.doi.org/10.1142/s0129054117400172.
Texto completo da fonteAbushgra, Abdulbast A. "Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review". Cryptography 6, n.º 1 (4 de março de 2022): 12. http://dx.doi.org/10.3390/cryptography6010012.
Texto completo da fonteIncze, Arpad. "Pixel-sieve cryptographic primitives with LSB steganography". Global Journal of Information Technology: Emerging Technologies 7, n.º 1 (27 de junho de 2017): 14–22. http://dx.doi.org/10.18844/gjit.v7i1.1934.
Texto completo da fonteShankar, K., e P. Eswaran. "RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique". Journal of Circuits, Systems and Computers 25, n.º 11 (14 de agosto de 2016): 1650138. http://dx.doi.org/10.1142/s0218126616501383.
Texto completo da fonteParuchuri, Vijaya Lakshmi, Dr R. Sridevi e K. S. SadaSiva Rao. "Image Steganography combined with Cryptography". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 9, n.º 1 (15 de julho de 2013): 976–84. http://dx.doi.org/10.24297/ijct.v9i1.4160.
Texto completo da fonteWANG, XINGYUAN, CHAOFENG DUAN e NINI GU. "A NEW CHAOTIC CRYPTOGRAPHY BASED ON ERGODICITY". International Journal of Modern Physics B 22, n.º 07 (20 de março de 2008): 901–8. http://dx.doi.org/10.1142/s0217979208038983.
Texto completo da fonteR, Nesamalar, e Dr Ravikumar K. "Proficient and Safe Token with Secret and Public Keys Sharing Algorithm for Preventing Cryptographic Key Leakage in Wireless Sensor Network". International Journal of Engineering Research in Electronics and Communication Engineering 9, n.º 9 (30 de agosto de 2022): 1–6. http://dx.doi.org/10.36647/ijerece/09.09.a001.
Texto completo da fonteG. S . Wijesiri, P. A. S. D. Perera,. "Encryption and Decryption Algorithms in Symmetric Key Cryptography Using Graph Theory". Psychology and Education Journal 58, n.º 1 (1 de janeiro de 2021): 3420–27. http://dx.doi.org/10.17762/pae.v58i1.1280.
Texto completo da fonteAlqadi, Ziad, Yousif Eltous e Amjad Al Hindi. "Secure, Image based Private Key for Secret Message Cryptography". International Journal of Computer Applications 183, n.º 41 (22 de dezembro de 2021): 1–8. http://dx.doi.org/10.5120/ijca2021921802.
Texto completo da fonteKr. Naskar, Prabir, Hari Narayan Khan, Ujjal Roy, Ayan Chaudhuri e Atal Chaudhuri. "Shared Cryptography with Embedded Session Key for Secret Audio". International Journal of Computer Applications 26, n.º 8 (31 de julho de 2011): 5–9. http://dx.doi.org/10.5120/3128-4305.
Texto completo da fonteUtami, Widya Catur, Rini Marwati e Sumanang Muhtar Gozali. "PENGGABUNGAN KRIPTOGRAFI RIVEST SHAMIR ADLEMAN (RSA) DAN ADVANCED ENCRYPTION STANDARD (AES) PADA APLIKASI PENGIRIM E-MAIL". Interval : Jurnal Ilmiah Matematika 3, n.º 2 (1 de março de 2024): 92–101. http://dx.doi.org/10.33751/interval.v3i2.8845.
Texto completo da fontePal, S., B. Datta e A. Karmakar. "An Artificial Neural Network Technique of Modern Cryptography". Journal of Scientific Research 14, n.º 2 (6 de maio de 2022): 471–81. http://dx.doi.org/10.3329/jsr.v14i2.55669.
Texto completo da fonteMukhtar, Naila, Mohamad Mehrabi, Yinan Kong e Ashiq Anjum. "Machine-Learning-Based Side-Channel Evaluation of Elliptic-Curve Cryptographic FPGA Processor". Applied Sciences 9, n.º 1 (25 de dezembro de 2018): 64. http://dx.doi.org/10.3390/app9010064.
Texto completo da fonteAyo-Aderele, A. O., S. O. Edeki, V. O. Udjor e O. Ugbenu. "A note on matrix algebra for cryptography settings and applications". Journal of Physics: Conference Series 2199, n.º 1 (1 de fevereiro de 2022): 012016. http://dx.doi.org/10.1088/1742-6596/2199/1/012016.
Texto completo da fonteDewi, Ratna, e Putri Kartika Sari. "The Improvement of Flip (2,2) Visual Cryptography Images Using Two Key Images". ComTech: Computer, Mathematics and Engineering Applications 7, n.º 3 (30 de setembro de 2016): 213. http://dx.doi.org/10.21512/comtech.v7i3.2501.
Texto completo da fonteSaputra, Joni, Herliana Rosika e M. Afriasyah. "Implementation Of Current Algorithm With Fibonnaci Series And Hexagonal Formula To Encode Messages". SainsTech Innovation Journal 4, n.º 2 (1 de novembro de 2021): 134–38. http://dx.doi.org/10.37824/sij.v4i2.2021.270.
Texto completo da fonteKynshi, Junestarfield, e Deepa Jose. "Enhanced Content Based Double Encryption Algorithm Using Symmetric Key Cryptography". Oriental journal of computer science and technology 10, n.º 2 (7 de abril de 2017): 345–51. http://dx.doi.org/10.13005/ojcst/10.02.13.
Texto completo da fonteShah, Aayush, Prabhat Mahato e Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm". International Journal for Research in Applied Science and Engineering Technology 11, n.º 8 (31 de agosto de 2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Texto completo da fonteAl Rubaie, Salwan Fadhel, e Maher K. Mahmood Al-Azawi. "High capacity double precision image steganography based on chaotic maps". Bulletin of Electrical Engineering and Informatics 13, n.º 1 (1 de fevereiro de 2024): 320–31. http://dx.doi.org/10.11591/eei.v13i1.6055.
Texto completo da fonteChallarapu, Neelima, e Suneetha Chivukula. "Elliptic Curve Cryptography Applied for (k,n) Threshold Secret Sharing Scheme". ECS Transactions 107, n.º 1 (24 de abril de 2022): 1021–28. http://dx.doi.org/10.1149/10701.1021ecst.
Texto completo da fonteZhang, Hongliang, Dongxiao Quan, Changhua Zhu e Zhigang Li. "A Quantum Cryptography Communication Network Based on Software Defined Network". ITM Web of Conferences 17 (2018): 01008. http://dx.doi.org/10.1051/itmconf/20181701008.
Texto completo da fonteNiko Surya Atmaja. "Symmetric Cryptography Modification Using Diffie Hellman On RDBMS". Journal of Information Technology, computer science and Electrical Engineering 1, n.º 1 (29 de fevereiro de 2024): 40–48. http://dx.doi.org/10.61306/jitcse.v1i1.7.
Texto completo da fonteAlqadi, Ziad. "Improving Standard Methods of Message Cryptography". International Journal of Computer Science and Mobile Computing 11, n.º 11 (30 de novembro de 2022): 13–30. http://dx.doi.org/10.47760/ijcsmc.2022.v11i11.003.
Texto completo da fonteS.N.Chakravarthy, A., e T. Anjikumar. "A Novel Symmetric Key Cryptography using Multiple Random Secret Keys". International Journal of Computer Applications 80, n.º 16 (18 de outubro de 2013): 27–32. http://dx.doi.org/10.5120/13954-1890.
Texto completo da fonte