Статті в журналах з теми "Cryptography"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Cryptography".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Yan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)." Journal of Physics: Conference Series 2386, no. 1 (December 1, 2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Повний текст джерелаGoldreich, Oded. "Cryptography and cryptographic protocols." Distributed Computing 16, no. 2-3 (September 1, 2003): 177–99. http://dx.doi.org/10.1007/s00446-002-0077-1.
Повний текст джерелаAnilkumar, Chunduru, Bhavani Gorle, and Kinthali Sowmya. "A Secure Method of Communication in Conventional Cryptography using Quantum Key Distribution." Applied and Computational Engineering 8, no. 1 (August 1, 2023): 68–73. http://dx.doi.org/10.54254/2755-2721/8/20230083.
Повний текст джерелаRusetskaya, Irina A. "CRYPTOGRAPHY. FROM THE PAST TO THE FUTURE." RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, no. 4 (2021): 47–57. http://dx.doi.org/10.28995/2686-679x-2021-4-47-57.
Повний текст джерелаGoyal, Rohit. "Quantum Cryptography: Secure Communication Beyond Classical Limits." Journal of Quantum Science and Technology 1, no. 1 (March 31, 2024): 1–5. http://dx.doi.org/10.36676/jqst.v1.i1.01.
Повний текст джерелаVictor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat, and Abdullayeva Shakhzoda. "Cryptography: Advances in Secure Communication and Data Protection." E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.
Повний текст джерелаAnilkumar, Chunduru, Swathi Lenka, N. Neelima, and Sathishkumar V E. "A Secure Method of Communication Through BB84 Protocol in Quantum Key Distribution." Scalable Computing: Practice and Experience 25, no. 1 (January 4, 2024): 21–33. http://dx.doi.org/10.12694/scpe.v25i1.2152.
Повний текст джерелаWANG, XINGYUAN, MING LIU, and NINI GU. "TWO NEW CHAOTIC CRYPTOGRAPHIES BASED ON DIFFERENT ATTRACTOR-PARTITION ALGORITHMS." International Journal of Modern Physics B 21, no. 27 (October 30, 2007): 4739–50. http://dx.doi.org/10.1142/s0217979207038071.
Повний текст джерелаShashi Raj K. "The Intersection of Algebra and Cryptography: Enhancing Information Security through Mathematical Foundations." Communications on Applied Nonlinear Analysis 31, no. 4s (July 5, 2024): 466–89. http://dx.doi.org/10.52783/cana.v31.943.
Повний текст джерелаYadav, Sonam. "An Extensive Study on Lattice-Based Cryptography and its Applications for RLWE-Based Problems." Universal Research Reports 10, no. 3 (2023): 104–10. http://dx.doi.org/10.36676/urr.2023-v10i3-014.
Повний текст джерелаOh, Chaerin, Woosang Im, Hyunil Kim, and Changho Seo. "Recent Trends in Cryptanalysis Techniques for White-box Block Ciphers." Korean Institute of Smart Media 12, no. 9 (October 30, 2023): 9–18. http://dx.doi.org/10.30693/smj.2023.12.9.9.
Повний текст джерелаBAFTIU, Naim. "Analysis and use of Cryptography techniques in programming language C#: Coding and Decoding." PRIZREN SOCIAL SCIENCE JOURNAL 4, no. 3 (December 31, 2020): 1–10. http://dx.doi.org/10.32936/pssj.v4i3.165.
Повний текст джерелаVirk, Udayveer Singh, Devansh Verma, Gagandeep Singh, and Prof Sheetal Laroiya Prof. Sheetal Laroiya. "Analyzing Cryptographic Techniques and Machine Learning Algorithms for Crime Prediction." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (October 22, 2024): 1–6. http://dx.doi.org/10.55041/ijsrem38099.
Повний текст джерелаHammad, Baraa Tareq, Ali Maki Sagheer, Ismail Taha Ahmed, and Norziana Jamil. "A comparative review on symmetric and asymmetric DNA-based cryptography." Bulletin of Electrical Engineering and Informatics 9, no. 6 (December 1, 2020): 2484–91. http://dx.doi.org/10.11591/eei.v9i6.2470.
Повний текст джерелаKumar,, Varun. "Challenges and Future Trends of Cryptography in Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 10, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30505.
Повний текст джерелаEt. al., Mandru Manisha,. "Colour Visual Cryptography (3,3) Scheme." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 3189–98. http://dx.doi.org/10.17762/turcomat.v12i2.2374.
Повний текст джерелаTeja, Penumantra Satya Sai, Mounika Lakshmi P, and Vinay Kumar K. "A Secure Communication through Quantum Key Distribution Protocols." International Research Journal of Electronics and Computer Engineering 4, no. 3 (September 30, 2018): 14. http://dx.doi.org/10.24178/irjece.2018.4.3.14.
Повний текст джерелаSabani, Maria E., Ilias K. Savvas, and Georgia Garani. "Learning with Errors: A Lattice-Based Keystone of Post-Quantum Cryptography." Signals 5, no. 2 (April 13, 2024): 216–43. http://dx.doi.org/10.3390/signals5020012.
Повний текст джерелаDabola, Shashank. "Chat Secure-Messaging Application Based on Secure Encryption Algorithm." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (March 31, 2024): 303–5. http://dx.doi.org/10.22214/ijraset.2024.58817.
Повний текст джерелаAnnu. "Algebraic Structures and Their Applications in Modern Cryptography." Innovative Research Thoughts 10, no. 3 (July 25, 2024): 52–59. http://dx.doi.org/10.36676/irt.v10.i3.1433.
Повний текст джерелаSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications." Mathematical Statistician and Engineering Applications 70, no. 1 (January 31, 2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Повний текст джерелаKhamalwa, Mulemi Simiyu. "Exploring how Commutative Algebra Underpins Cryptographic Protocols and Encryption Methods Used in Secure Communications and Data Protection." NEWPORT INTERNATIONAL JOURNAL OF SCIENTIFIC AND EXPERIMENTAL SCIENCES 5, no. 3 (June 14, 2024): 58–62. http://dx.doi.org/10.59298/nijses/2024/10.5.586237.
Повний текст джерелаDubey, Praveer, and Ompal Yadav. "A Survey on Quantum cryptography versus classical Cryptography." International Journal of Current Engineering and Technology 10, no. 06 (October 31, 2021): 910–13. http://dx.doi.org/10.14741/ijcet/v.10.6.3.
Повний текст джерелаAkram, Zaryab. "Cryptology Based on Laplace Transform of Hyperbolic Function and Matrix Decomposition Method." ECS Meeting Abstracts MA2022-02, no. 64 (October 9, 2022): 2364. http://dx.doi.org/10.1149/ma2022-02642364mtgabs.
Повний текст джерелаChandre, Pankaj R., Bhagyashree D. Shendkar, Sayalee Deshmukh, Sameer Kakade, and Suvarna Potdukhe. "Machine Learning-Enhanced Advancements in Quantum Cryptography: A Comprehensive Review and Future Prospects." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11s (October 10, 2023): 642–55. http://dx.doi.org/10.17762/ijritcc.v11i11s.8300.
Повний текст джерелаShah, Aayush, Prabhat Mahato, and Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (August 31, 2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Повний текст джерелаBala, Romi, and Hemant Pandey. "Advances in Discrete Mathematics: From Combinatorics to Cryptography." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, no. 3 (December 13, 2019): 1643–46. http://dx.doi.org/10.61841/turcomat.v10i3.14624.
Повний текст джерелаSedat Sonko, Kenneth Ifeanyi Ibekwe, Valentine Ikenna Ilojianya, Emmanuel Augustine Etukudoh, and Adefunke Fabuyide. "QUANTUM CRYPTOGRAPHY AND U.S. DIGITAL SECURITY: A COMPREHENSIVE REVIEW: INVESTIGATING THE POTENTIAL OF QUANTUM TECHNOLOGIES IN CREATING UNBREAKABLE ENCRYPTION AND THEIR FUTURE IN NATIONAL SECURITY." Computer Science & IT Research Journal 5, no. 2 (February 18, 2024): 390–414. http://dx.doi.org/10.51594/csitrj.v5i2.790.
Повний текст джерелаDhakne, Dr Amol, Prasann Shimpi, Sanket Halake, Shivam Dharmshetti, and Shashank Singh. "Neural Network Based Message Concealment Scheme." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 1368–78. http://dx.doi.org/10.22214/ijraset.2022.42522.
Повний текст джерелаOlajide Soji Osundare, Chidiebere Somadina Ike, Ololade Gilbert Fakeyede, and Adebimpe Bolatito Ige. "Blockchain and quantum cryptography: Future of secure telecommunications in banking." Engineering Science & Technology Journal 3, no. 2 (December 30, 2022): 154–71. http://dx.doi.org/10.51594/estj.v3i2.1523.
Повний текст джерелаPriya, R. Shanmuga, and A. Senthilkumar. "A Study on Visual Cryptography for Colour Images." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (August 1, 2017): 260. http://dx.doi.org/10.23956/ijarcsse/v7i7/0172.
Повний текст джерелаKaushal, Milind. "Cryptography: A Brief Review." International Journal for Research in Applied Science and Engineering Technology 10, no. 2 (February 28, 2022): 763–67. http://dx.doi.org/10.22214/ijraset.2022.40401.
Повний текст джерелаWang, Xing, Qiang Zhang, and Xiao Peng Wei. "A New Encryption Method Based on Rijndael Algorithm and DNA Computing." Applied Mechanics and Materials 20-23 (January 2010): 1241–46. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1241.
Повний текст джерелаSankhyan, Bhanu. "Review on Symmetric and Asymmetric Cryptography." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (March 31, 2024): 2934–40. http://dx.doi.org/10.22214/ijraset.2024.59538.
Повний текст джерелаAbbasi, Faisal. "Quantum Cryptography: The Future of Internet and Security Management." Journal of Management and Service Science (JMSS) 1, no. 1 (2021): 1–12. http://dx.doi.org/10.54060/jmss/001.01.004.
Повний текст джерелаBharati A. Patil, Prajakta R. Toke, and Sharyu S. Naiknavare. "Research on Various Cryptography Techniques." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 2 (April 22, 2024): 685–92. http://dx.doi.org/10.32628/cseit2410290.
Повний текст джерелаGeetha, M., and K. Akila. "SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS." IJISCS (International Journal of Information System and Computer Science) 2, no. 3 (March 14, 2019): 123. http://dx.doi.org/10.56327/ijiscs.v2i3.708.
Повний текст джерелаB S, Aditya, and Sharadadevi Kaganurmath. "Use of Cryptography and Signing for Network Security." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 4080–83. http://dx.doi.org/10.22214/ijraset.2022.45926.
Повний текст джерелаSabaya, Dinaeli Paul, Adam Aloyce Semlambo, and Joel Kazoba Simon. "Data Security Through Crypto-Stegano Systems." International Journal of Computational Science, Information Technology and Control Engineering 10, no. 1/2/3 (July 27, 2023): 1–23. http://dx.doi.org/10.5121/ijcsitce.2023.10301.
Повний текст джерелаNana, Nana, and Puguh Wahyu Prasetyo. "An implementation of Hill cipher and 3x3x3 rubik's cube to enhance communication security." Bulletin of Applied Mathematics and Mathematics Education 1, no. 2 (December 10, 2021): 75–92. http://dx.doi.org/10.12928/bamme.v1i2.4252.
Повний текст джерелаRani, Rashmi. "Quantum Cryptography: Fundamentals and Advanced Techniques." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (May 31, 2024): 5747–51. http://dx.doi.org/10.22214/ijraset.2024.62943.
Повний текст джерелаVignesh, R. Sakthi, S. Sudharssun, and K. J. Jegadish kumar. "Contemporary Cryptography and Arguments for Classical Cryptography's Endurance alongside the Propitious Quantum Cryptography." International Journal of Computer Applications 1, no. 26 (February 25, 2010): 59–64. http://dx.doi.org/10.5120/479-786.
Повний текст джерелаLohith D K and Sanjay M. "A system of symmetric key cryptography using deep learning." Global Journal of Engineering and Technology Advances 20, no. 2 (August 30, 2024): 081–89. http://dx.doi.org/10.30574/gjeta.2024.20.2.0139.
Повний текст джерелаViresh, Kasheenath Babaleshwar, Karade Sinchana, N. Sakshi, and Naidu Anush. "Audio encryption and decryption using AES algorithm technique." i-manager’s Journal on Electronics Engineering 14, no. 2 (2024): 8. http://dx.doi.org/10.26634/jele.14.2.20486.
Повний текст джерелаDrzazga, Bartosz, and Łukasz Krzywiecki. "Review of Chosen Isogeny-Based Cryptographic Schemes." Cryptography 6, no. 2 (May 31, 2022): 27. http://dx.doi.org/10.3390/cryptography6020027.
Повний текст джерелаIrawan, Muhammad Dedi. "IMPLEMENTASI KRIPTOGRAFI VIGENERE CIPHER DENGAN PHP." JURNAL TEKNOLOGI INFORMASI 1, no. 1 (June 1, 2017): 11. http://dx.doi.org/10.36294/jurti.v1i1.21.
Повний текст джерелаYalla, Surya Prakash, Archana Uriti, Abhisek Sethy, and Sathishkumar V. E. "Secure method of communication using Quantum Key Distribution." Applied and Computational Engineering 30, no. 1 (January 22, 2024): 32–37. http://dx.doi.org/10.54254/2755-2721/30/20230065.
Повний текст джерелаTama, Yanuar Bhakti Wira, and Muhammad Firdhausi Fahmi. "Sistem Kriptografi Klasik Dengan Memanfaatkan Orde Dari Grup Titik Pada Kurva Eliptik Bentuk Montgomery." Euler : Jurnal Ilmiah Matematika, Sains dan Teknologi 11, no. 2 (December 16, 2023): 361–71. http://dx.doi.org/10.37905/euler.v11i2.23009.
Повний текст джерелаLiang, Yuheng. "A research on applications of neural network-based cryptography." Applied and Computational Engineering 14, no. 1 (October 23, 2023): 258–64. http://dx.doi.org/10.54254/2755-2721/14/20230798.
Повний текст джерелаDarko, Cyprian Danso. "Data Security in the Cloud Using Multi-Modal Bio-Cryptographic Authentication." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (November 30, 2022): 9–14. http://dx.doi.org/10.22624/aims/digital/v10n4p2.
Повний текст джерела