Статті в журналах з теми "CRYPTOGRAPHI"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "CRYPTOGRAPHI".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
WANG, XINGYUAN, MING LIU, and NINI GU. "TWO NEW CHAOTIC CRYPTOGRAPHIES BASED ON DIFFERENT ATTRACTOR-PARTITION ALGORITHMS." International Journal of Modern Physics B 21, no. 27 (October 30, 2007): 4739–50. http://dx.doi.org/10.1142/s0217979207038071.
Повний текст джерелаYan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)." Journal of Physics: Conference Series 2386, no. 1 (December 1, 2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Повний текст джерелаGoldreich, Oded. "Cryptography and cryptographic protocols." Distributed Computing 16, no. 2-3 (September 1, 2003): 177–99. http://dx.doi.org/10.1007/s00446-002-0077-1.
Повний текст джерелаBAFTIU, Naim. "Analysis and use of Cryptography techniques in programming language C#: Coding and Decoding." PRIZREN SOCIAL SCIENCE JOURNAL 4, no. 3 (December 31, 2020): 1–10. http://dx.doi.org/10.32936/pssj.v4i3.165.
Повний текст джерела., Abhishek Misal, and Tin Mar Kyi . "Virtual Cryptopgraphic Technique and Bit-plane Segmentation Stegnegography for Security in Bioinformatics and Biomedical Applications." CSVTU International Journal of Biotechnology Bioinformatics and Biomedical 4, no. 2 (September 3, 2019): 59–66. http://dx.doi.org/10.30732/ijbbb.20190402005.
Повний текст джерелаAnilkumar, Chunduru, Bhavani Gorle, and Kinthali Sowmya. "A Secure Method of Communication in Conventional Cryptography using Quantum Key Distribution." Applied and Computational Engineering 8, no. 1 (August 1, 2023): 68–73. http://dx.doi.org/10.54254/2755-2721/8/20230083.
Повний текст джерелаPaul, Sebastian, and Melanie Niethammer. "On the importance of cryptographic agility for industrial automation." at - Automatisierungstechnik 67, no. 5 (May 27, 2019): 402–16. http://dx.doi.org/10.1515/auto-2019-0019.
Повний текст джерелаVictor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat, and Abdullayeva Shakhzoda. "Cryptography: Advances in Secure Communication and Data Protection." E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.
Повний текст джерелаRusetskaya, Irina A. "CRYPTOGRAPHY. FROM THE PAST TO THE FUTURE." RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, no. 4 (2021): 47–57. http://dx.doi.org/10.28995/2686-679x-2021-4-47-57.
Повний текст джерелаSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications." Mathematical Statistician and Engineering Applications 70, no. 1 (January 31, 2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Повний текст джерелаDarko, Cyprian Danso. "Data Security in the Cloud Using Multi-Modal Bio-Cryptographic Authentication." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (November 30, 2022): 9–14. http://dx.doi.org/10.22624/aims/digital/v10n4p2.
Повний текст джерелаLiu, Lingfeng, Hongyue Xiang, Renzhi Li, and Hanping Hu. "The Eigenvalue Complexity of Sequences in the Real Domain." Entropy 21, no. 12 (December 5, 2019): 1194. http://dx.doi.org/10.3390/e21121194.
Повний текст джерелаIrawan, Muhammad Dedi. "IMPLEMENTASI KRIPTOGRAFI VIGENERE CIPHER DENGAN PHP." JURNAL TEKNOLOGI INFORMASI 1, no. 1 (June 1, 2017): 11. http://dx.doi.org/10.36294/jurti.v1i1.21.
Повний текст джерелаAkram, Zaryab. "Cryptology Based on Laplace Transform of Hyperbolic Function and Matrix Decomposition Method." ECS Meeting Abstracts MA2022-02, no. 64 (October 9, 2022): 2364. http://dx.doi.org/10.1149/ma2022-02642364mtgabs.
Повний текст джерелаVanjara, Pratik A., and Dr Kishor Atkotiya. "An Investigation Into the Field of Cryptography and Cryptographic Algorithm Protocols." Paripex - Indian Journal Of Research 2, no. 2 (January 15, 2012): 58–60. http://dx.doi.org/10.15373/22501991/feb2013/19.
Повний текст джерелаHammad, Baraa Tareq, Ali Maki Sagheer, Ismail Taha Ahmed, and Norziana Jamil. "A comparative review on symmetric and asymmetric DNA-based cryptography." Bulletin of Electrical Engineering and Informatics 9, no. 6 (December 1, 2020): 2484–91. http://dx.doi.org/10.11591/eei.v9i6.2470.
Повний текст джерелаChochtoula, Despoina, Aristidis Ilias, Yannis C. Stamatiou, and Christos Makris. "Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol." Future Internet 14, no. 8 (July 28, 2022): 232. http://dx.doi.org/10.3390/fi14080232.
Повний текст джерелаGil Molk, Ali Mohammad Norouzzadeh, Mohammad Reza Aref, and Reza Ramazani Khorshiddoust. "Analysis of design goals of cryptography algorithms based on different components." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 1 (July 1, 2021): 540. http://dx.doi.org/10.11591/ijeecs.v23.i1.pp540-548.
Повний текст джерелаHafiz Nanda Ginting, Subhan, Muhammad Rhifky Wayahdi, and Surya Guntur. "Playfair Cipher Algorithm in Learning Media." Jurnal Minfo Polgan 11, no. 1 (March 5, 2022): 9–14. http://dx.doi.org/10.33395/jmp.v11i1.11560.
Повний текст джерелаDas, Jyotirmoy, Sangeeta Kakoty, and Majidul Ahmed. "A Study on Modern Cryptographic Primitives and Signature Schemes." IRA-International Journal of Technology & Engineering (ISSN 2455-4480) 5, no. 3 (December 27, 2016): 70. http://dx.doi.org/10.21013/jte.v5.n3.p3.
Повний текст джерелаB S, Aditya, and Sharadadevi Kaganurmath. "Use of Cryptography and Signing for Network Security." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 4080–83. http://dx.doi.org/10.22214/ijraset.2022.45926.
Повний текст джерелаSabaya, Dinaeli Paul, Adam Aloyce Semlambo, and Joel Kazoba Simon. "Data Security Through Crypto-Stegano Systems." International Journal of Computational Science, Information Technology and Control Engineering 10, no. 1/2/3 (July 27, 2023): 1–23. http://dx.doi.org/10.5121/ijcsitce.2023.10301.
Повний текст джерелаEt. al., Mandru Manisha,. "Colour Visual Cryptography (3,3) Scheme." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 3189–98. http://dx.doi.org/10.17762/turcomat.v12i2.2374.
Повний текст джерелаDanoyan, D. H. "EXTENDING WHITE-BOX CRYPTOGRAPHY BASED OBLIVIOUS TRANSFER PROTOCOL." Proceedings of the YSU A: Physical and Mathematical Sciences 50, no. 1 (239) (March 18, 2016): 40–44. http://dx.doi.org/10.46991/psyu:a/2016.50.1.040.
Повний текст джерелаZHANG, YU. "The computational SLR: a logic for reasoning about computational indistinguishability." Mathematical Structures in Computer Science 20, no. 5 (October 2010): 951–75. http://dx.doi.org/10.1017/s0960129510000265.
Повний текст джерелаIppolitova, Aleksandra. "The Functions of the Cryptography in the Olonets Codex of Incantations of 17th Сentury. 1. Systematization of Data". Slavianovedenie, № 6 (2022): 38. http://dx.doi.org/10.31857/s0869544x0023260-9.
Повний текст джерелаTeja, Penumantra Satya Sai, Mounika Lakshmi P, and Vinay Kumar K. "A Secure Communication through Quantum Key Distribution Protocols." International Research Journal of Electronics and Computer Engineering 4, no. 3 (September 30, 2018): 14. http://dx.doi.org/10.24178/irjece.2018.4.3.14.
Повний текст джерелаXiao, Dianyan, and Yang Yu. "Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption." Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/4957045.
Повний текст джерелаHulian, A. D., and R. V. Karpenko. "TRANSFER THAT ARE NEEDERS FOR CRYSTOVAL AS INVESTMENT UNION SPECULATIVE ASSET." Actual problems of native jurisprudence, no. 05 (December 5, 2019): 60–65. http://dx.doi.org/10.15421/391958.
Повний текст джерелаDuka, Mariusz. "ELLIPTIC-CURVE CRYPTOGRAPHY (ECC) AND ARGON2 ALGORITHM IN PHP USING OPENSSL AND SODIUM LIBRARIES." Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 10, no. 3 (September 30, 2020): 91–94. http://dx.doi.org/10.35784/iapgos.897.
Повний текст джерелаMakeri, Yakubu Ajiji. "INTEGRATED CRYPTOGRAPHICAL ACCESS CONTROL OVER NETWORK PROJECT." Acta Informatica Malaysia 4, no. 1 (May 18, 2020): 19–21. http://dx.doi.org/10.26480/aim.01.2020.19.21.
Повний текст джерелаGeetha, M., and K. Akila. "SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS." IJISCS (International Journal of Information System and Computer Science) 2, no. 3 (March 14, 2019): 123. http://dx.doi.org/10.56327/ijiscs.v2i3.708.
Повний текст джерелаKlyucharev, Petr. "CELLULAR AUTOMATA AND THEIR GENERALIZATIONS IN CRYPTOGRAPHY. PART 2." Voprosy kiberbezopasnosti, no. 1(47) (2022): 37–48. http://dx.doi.org/10.21681/2311-3456-2022-1-37-48.
Повний текст джерелаAbhishek, Kunal, and E. George Dharma Prakash Raj. "Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography." Cybernetics and Information Technologies 21, no. 2 (June 1, 2021): 70–88. http://dx.doi.org/10.2478/cait-2021-0020.
Повний текст джерелаKaushal, Milind. "Cryptography: A Brief Review." International Journal for Research in Applied Science and Engineering Technology 10, no. 2 (February 28, 2022): 763–67. http://dx.doi.org/10.22214/ijraset.2022.40401.
Повний текст джерелаNana, Nana, and Puguh Wahyu Prasetyo. "An implementation of Hill cipher and 3x3x3 rubik's cube to enhance communication security." Bulletin of Applied Mathematics and Mathematics Education 1, no. 2 (December 10, 2021): 75–92. http://dx.doi.org/10.12928/bamme.v1i2.4252.
Повний текст джерелаOkhrimenko, Tetiana, Serhii Dorozhynskyi, and Bohdan Horbakha. "ANALYSIS OF QUANTUM SECURE DIRECT COMMUNICATION PROTOCOLS." Computer systems and information technologies, no. 1 (March 30, 2023): 62–67. http://dx.doi.org/10.31891/csit-2023-1-8.
Повний текст джерелаNişancı, Görkem, Paul G. Flikkema, and Tolga Yalçın. "Symmetric Cryptography on RISC-V: Performance Evaluation of Standardized Algorithms." Cryptography 6, no. 3 (August 10, 2022): 41. http://dx.doi.org/10.3390/cryptography6030041.
Повний текст джерелаChiou, Shin-Yan. "Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions." BioMed Research International 2013 (2013): 1–12. http://dx.doi.org/10.1155/2013/623815.
Повний текст джерелаLada, Nataliia, and Yuliia Rudnytska. "IMPLEMENTATION OF A METHOD FOR SYNTHESIZING GROUPS OF SYMMETRIC DOUBLE-OPERAND OPERATIONS OF CRYPTOGRAPHIC INFORMATION CODING FOR BLOCK ENCRYPTION SYSTEMS." Innovative Technologies and Scientific Solutions for Industries, no. 2 (20) (June 30, 2022): 35–43. http://dx.doi.org/10.30837/itssi.2022.20.035.
Повний текст джерелаKlyucharev, Petr. "Cellular Automata and Their Generalizations in Cryptography. Part 1." Voprosy kiberbezopasnosti, no. 6(46) (2021): 90–101. http://dx.doi.org/10.21681/2311-3456-2021-6-90-101.
Повний текст джерелаWang, Xing, Qiang Zhang, and Xiao Peng Wei. "A New Encryption Method Based on Rijndael Algorithm and DNA Computing." Applied Mechanics and Materials 20-23 (January 2010): 1241–46. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1241.
Повний текст джерелаBarthe, Gilles. "High-Assurance Cryptography: Cryptographic Software We Can Trust." IEEE Security & Privacy 13, no. 5 (September 2015): 86–89. http://dx.doi.org/10.1109/msp.2015.112.
Повний текст джерелаOctora Ginting, Ferraro S., Veithzal Rivai Zainal, and Aziz Hakim. "Digital Signature Standard Implementation Strategy by Optimizing Hash Functions Through Performance Optimization." Journal of Accounting and Finance Management 3, no. 6 (February 19, 2023): 362–71. http://dx.doi.org/10.38035/jafm.v3i6.175.
Повний текст джерелаKlimushyn, Petro, Tetiana Solianyk, Oleksandr Mozhaev, Vitalii Nosov, Tetiana Kolisnyk, and Vasily Yanov. "HARDWARE SUPPORT PROCEDURES FOR ASYMMETRIC AUTHENTICATION OF THE INTERNET OF THINGS." Innovative Technologies and Scientific Solutions for Industries, no. 4 (18) (December 10, 2021): 31–39. http://dx.doi.org/10.30837/itssi.2021.18.031.
Повний текст джерелаZill, E. Huma, Ul Rahman Jamshaid, Suleman Muhammad, and Anjum Naveed. "Cryptographic method based on natural-elzaki transform." i-manager’s Journal on Mathematics 11, no. 1 (2022): 39. http://dx.doi.org/10.26634/jmat.11.1.18511.
Повний текст джерелаPriya, R. Shanmuga, and A. Senthilkumar. "A Study on Visual Cryptography for Colour Images." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (August 1, 2017): 260. http://dx.doi.org/10.23956/ijarcsse/v7i7/0172.
Повний текст джерелаDanger, Jean-Luc, Youssef El Housni, Adrien Facon, Cheikh Gueye, Sylvain Guilley, Sylvie Herbel, Ousmane Ndiaye, Edoardo Persichetti, and Alexander Schaub. "On the Performance and Security of Multiplication in GF(2N)." Cryptography 2, no. 3 (September 18, 2018): 25. http://dx.doi.org/10.3390/cryptography2030025.
Повний текст джерелаCambou, Bertrand, Michael Gowanlock, Bahattin Yildiz, Dina Ghanaimiandoab, Kaitlyn Lee, Stefan Nelson, Christopher Philabaum, Alyssa Stenberg, and Jordan Wright. "Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions." Applied Sciences 11, no. 6 (March 21, 2021): 2801. http://dx.doi.org/10.3390/app11062801.
Повний текст джерелаBanu, Anees. "Improved Algorithm of Steganography Combined with Cryptography." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 3793–804. http://dx.doi.org/10.22214/ijraset.2021.35792.
Повний текст джерела