Search
Search Results
-
Cryptography Libraries in C/C++23
The purpose of this chapter is to give a thorough list of C++ libraries that are compatible with C++23’s new features. When professionals need access... -
How Cryptography Works
When I was a kid, my parents often took me on a trip to “The South” during the summer breaks. I grew up in St. Petersburg, the big city in Russia's... -
Securing Data via Cryptography and Arabic Text Steganography
This research proposes an efficient security system for hiding classified Arabic text-data on limited processors devices benefiting from the...
-
Introduction to Homomorphic Encryption for Financial Cryptography
A revolution in data cooperation is promised by privacy-enhancing technologies (PETs), which allow for the exchange of more data than ever before... -
Evolution of Applied Cryptography
This chapter briefly explains the evolution of applied cryptography by reflecting on its origins and its ongoing evolution. The objective of this... -
Elliptic Curve Cryptography
In this chapter, we briefly motivate the use of asymmetric cryptography based on ECC systems for applications in resource-constrained devices like... -
A Hybrid Intelligent Cryptography Algorithm for Distributed Big Data Storage in Cloud Computing Security
Present Cloud computing is the most adaptable and popular technology. Through the services, customer gets efficiency, competence and quickness etc.... -
Post-quantum Cryptography in 6G
The quantum computing paradigm is fundamentally different from the classical one. There are computational problems we are not able to solve on a... -
Cryptography: Integrity and Authenticity
Data integrity can be protected using hash functions, message authentication codes, and digital signatures. These cryptographic mechanisms are... -
Dual Security RGB Image Encryption Algorithm for Lightweight Cryptography
An efficacious mathematical cryptographic algorithm for three-plane RGB images based on an L-shaped fractal and a 1-D chaotic tent map is proposed.... -
Introduction to Cryptography
Cybersecurity has become a popular topic of interest. Most recent and widely known examples of security problems include password leakage on popular... -
Getting Started in Cryptography and Cryptanalysis
Due to the rapid evolution of electronic communication, the number of issues raised by information security increases every day. Messages shared over... -
A Survey on Homomorphic Encryption for Financial Cryptography Workout
The use of cloud computing has grown in popularity recently all around the world. A new paradigm for information processing and storage is introduced... -
Card-Based Cryptography Meets Formal Verification
Card-based cryptography provides simple and practicable protocols for performing secure multi-party computation with just a deck of cards. For the...
-
Optimizing the Security and Privacy of Cloud Data Communication; Hybridizing Cryptography and Steganography Using Triple Key of AES, RSA and LSB with Deceptive QR Code Technique: A Novel Approach
The propensity of transmitting improperly protected data in the clouds securely to its intended destination, free of being intercepted and deciphered... -
Fundamentals of Cryptography
The basic information security services are known to include confidentiality, integrity and availability, which are know as the CIA triad. This... -
Fault-tolerant identity-based encryption from SM9
This paper initiates the formal study of attribute-based encryption within the framework of SM9, the Chinese National Cryptography Standard for...
-
Pro Cryptography and Cryptanalysis Creating Advanced Algorithms with C# and .NET
Utilize this comprehensive, yet practical, overview of modern cryptography and cryptanalysis to improve performance. Learn by example with source...
-
A novel method to musicalize shape and visualize music and a novel technique in music cryptography
Since many years ago, musicians have composed music based on the images that they have had in their minds. On the other hand, music affects people’s...
-
Getting Started in Cryptography and Cryptanalysis
Knowledge is one of the most important aspects to consider when designing and implementing complex systems, such as companies, organizations,...