We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 8,882 results
  1. Cryptography Libraries in C/C++23

    The purpose of this chapter is to give a thorough list of C++ libraries that are compatible with C++23’s new features. When professionals need access...
    Marius Iulian Mihailescu, Stefania Loredana Nita in Pro Cryptography and Cryptanalysis with C++23
    Chapter 2023
  2. How Cryptography Works

    When I was a kid, my parents often took me on a trip to “The South” during the summer breaks. I grew up in St. Petersburg, the big city in Russia's...
    Slava Gomzin in Crypto Basics
    Chapter 2022
  3. Securing Data via Cryptography and Arabic Text Steganography

    This research proposes an efficient security system for hiding classified Arabic text-data on limited processors devices benefiting from the...

    Malak Alkhudaydi, Adnan Gutub in SN Computer Science
    Article 19 January 2021
  4. Introduction to Homomorphic Encryption for Financial Cryptography

    A revolution in data cooperation is promised by privacy-enhancing technologies (PETs), which allow for the exchange of more data than ever before...
    Rajesh Kumar Dhanaraj, S. Suganyadevi, ... Mariya Ouaissa in Homomorphic Encryption for Financial Cryptography
    Chapter 2023
  5. Evolution of Applied Cryptography

    This chapter briefly explains the evolution of applied cryptography by reflecting on its origins and its ongoing evolution. The objective of this...
    Chapter 2021
  6. Elliptic Curve Cryptography

    In this chapter, we briefly motivate the use of asymmetric cryptography based on ECC systems for applications in resource-constrained devices like...
    Chapter 2021
  7. A Hybrid Intelligent Cryptography Algorithm for Distributed Big Data Storage in Cloud Computing Security

    Present Cloud computing is the most adaptable and popular technology. Through the services, customer gets efficiency, competence and quickness etc....
    P. T. Satyanarayana Murty, M. Prasad, ... Ch. Phaneendra Varma in Multi-disciplinary Trends in Artificial Intelligence
    Conference paper 2023
  8. Post-quantum Cryptography in 6G

    The quantum computing paradigm is fundamentally different from the classical one. There are computational problems we are not able to solve on a...
    Juha Partala in 6G Mobile Wireless Networks
    Chapter 2021
  9. Cryptography: Integrity and Authenticity

    Data integrity can be protected using hash functions, message authentication codes, and digital signatures. These cryptographic mechanisms are...
    Chapter 2022
  10. Dual Security RGB Image Encryption Algorithm for Lightweight Cryptography

    An efficacious mathematical cryptographic algorithm for three-plane RGB images based on an L-shaped fractal and a 1-D chaotic tent map is proposed....
    Vrushali Khaladkar, Manish Kumar in Advancements in Smart Computing and Information Security
    Conference paper 2024
  11. Introduction to Cryptography

    Cybersecurity has become a popular topic of interest. Most recent and widely known examples of security problems include password leakage on popular...
    Sirapat Boonkrong in Authentication and Access Control
    Chapter 2021
  12. Getting Started in Cryptography and Cryptanalysis

    Due to the rapid evolution of electronic communication, the number of issues raised by information security increases every day. Messages shared over...
    Marius Iulian Mihailescu, Stefania Loredana Nita in Cryptography and Cryptanalysis in MATLAB
    Chapter 2021
  13. A Survey on Homomorphic Encryption for Financial Cryptography Workout

    The use of cloud computing has grown in popularity recently all around the world. A new paradigm for information processing and storage is introduced...
    M. Siva Sangari, K. Balasamy, ... S. Surya in Homomorphic Encryption for Financial Cryptography
    Chapter 2023
  14. Card-Based Cryptography Meets Formal Verification

    Card-based cryptography provides simple and practicable protocols for performing secure multi-party computation with just a deck of cards. For the...

    Alexander Koch, Michael Schrempp, Michael Kirsten in New Generation Computing
    Article Open access 02 April 2021
  15. Optimizing the Security and Privacy of Cloud Data Communication; Hybridizing Cryptography and Steganography Using Triple Key of AES, RSA and LSB with Deceptive QR Code Technique: A Novel Approach

    The propensity of transmitting improperly protected data in the clouds securely to its intended destination, free of being intercepted and deciphered...
    Edwin Xorsenyo Amenu, Sridaran Rajagopal in Advancements in Smart Computing and Information Security
    Conference paper 2024
  16. Fundamentals of Cryptography

    The basic information security services are known to include confidentiality, integrity and availability, which are know as the CIA triad. This...
    Chuan-Kun Wu in Internet of Things Security
    Chapter 2021
  17. Fault-tolerant identity-based encryption from SM9

    This paper initiates the formal study of attribute-based encryption within the framework of SM9, the Chinese National Cryptography Standard for...

    **aohong Liu, **nyi Huang, ... Wei Wu in Science China Information Sciences
    Article 22 January 2024
  18. Pro Cryptography and Cryptanalysis Creating Advanced Algorithms with C# and .NET

    Utilize this comprehensive, yet practical, overview of modern cryptography and cryptanalysis to improve performance. Learn by example with source...

    Marius Iulian Mihailescu, Stefania Loredana Nita
    Book 2021
  19. A novel method to musicalize shape and visualize music and a novel technique in music cryptography

    Since many years ago, musicians have composed music based on the images that they have had in their minds. On the other hand, music affects people’s...

    Yasaman Mashhadi Hashem Marandi, Hedieh Sajedi, Sepehr Pirasteh in Multimedia Tools and Applications
    Article 28 October 2020
  20. Getting Started in Cryptography and Cryptanalysis

    Knowledge is one of the most important aspects to consider when designing and implementing complex systems, such as companies, organizations,...
    Marius Iulian Mihailescu, Stefania Loredana Nita in Pro Cryptography and Cryptanalysis with C++20
    Chapter 2021
Did you find what you were looking for? Share feedback.