We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 8,882 results
  1. Historical notes on Russian cryptography

    The article is devoted to the main milestones in the development of encryption techniques and mathematical methods of cryptography in Russia from the...

    Anna Epishkina, Sergey Zapechnikov, Anna Belozubova in Journal of Computer Virology and Hacking Techniques
    Article 15 May 2023
  2. An Introduction to Classical and Modern Cryptography

    The remote environment bounded us to share information, documents, money, etc. with the help of applications, devices, and tools. The information,...
    Rajkumar Banoth, Rekha Regar in Classical and Modern Cryptography for Beginners
    Chapter 2023
  3. Mathematical Foundation for Classical and Modern Cryptography

    The design of public-key cyphers prevents knowledge of the encryption key from revealing the identity of the decryption key. Making advantage of a...
    Rajkumar Banoth, Rekha Regar in Classical and Modern Cryptography for Beginners
    Chapter 2023
  4. Cryptography

    This chapter describes the basic techniques of cryptography as a tool to ensure confidentiality of data.
    Chapter 2024
  5. Cryptography

    Bitcoin gave rise to the specific type of virtual currency known as cryptocurrency. The reason for this name is the extended use of cryptography. A...
    Anders Lisdorf in Still Searching for Satoshi
    Chapter 2023
  6. Implementing Post-quantum Cryptography for Developers

    Widely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose...

    Julius Hekkala, Mari Muurman, ... Visa Vallivaara in SN Computer Science
    Article Open access 29 April 2023
  7. Applied Cryptography

    This chapter illustrates how cryptography can be used to achieve aims other than confidentiality of data. In particular, it can be used to ensure:...
    Chapter 2024
  8. A novel secure cryptography model for data transmission based on Rotor64 technique

    In recent years, there have been many Security vulnerabilities that threaten user security, these threats have led to the finding of user files, so...

    Ibrahim Obeidat, Ala Mughaid, ... Laith Abualigah in Multimedia Tools and Applications
    Article 30 September 2023
  9. Classical and Modern Cryptography for Beginners

    This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or...

    Rajkumar Banoth, Rekha Regar
    Textbook 2023
  10. Cryptography

    As society speeds, and in most cases is literally dragged, into the new information society, the kind of face-to-face and paper-traceable...
    Joseph Migga Kizza in Guide to Computer Network Security
    Chapter 2024
  11. Quantum-safe cryptography: crossroads of coding theory and cryptography

    We present an overview of quantum-safe cryptography (QSC) with a focus on post-quantum cryptography (PQC) and information-theoretic security. From a...

    Jiabo Wang, Ling Liu, ... Cong Ling in Science China Information Sciences
    Article Open access 21 December 2021
  12. TEXCEL: text encryption with elliptic curve cryptography for enhanced security

    Elliptic curve cryptography has emerged as a potent tool for safeguarding data communications. This research paper addresses the problem of...

    P. L. Sharma, Shalini Gupta, ... Arun Kumar Sharma in Multimedia Tools and Applications
    Article 22 May 2024
  13. Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis

    In today's interconnected world, safeguarding digital data's confidentiality and security is crucial. Cryptography and steganography are two primary...

    Indy Haverkamp, Dipti K. Sarmah in International Journal of Information Security
    Article Open access 05 May 2024
  14. Cryptography Foundations

    This chapter introduces the concept of cryptography, or mathematical codes used to protect data. It can be a tough concept. To help make this concept...
    Seth James Nielson in Discovering Cybersecurity
    Chapter 2023
  15. Cryptography Fundamentals

    Cryptographic history is incredibly long and fascinating. The Code Book: The Secrets Behind Codebreaking [1] is a comprehensive reference that...
    Marius Iulian Mihailescu, Stefania Loredana Nita in Pro Cryptography and Cryptanalysis with C++23
    Chapter 2023
  16. Understanding Cryptography From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms

    Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even...
    Christof Paar, Jan Pelzl, Tim Güneysu
    Textbook 2024
  17. Lattice-based Cryptography

    This chapter has an overview of lattice-based cryptography. You learn why lattices are important in cryptography and their challenges. Furthermore,...
    Marius Iulian Mihailescu, Stefania Loredana Nita in Pro Cryptography and Cryptanalysis with C++23
    Chapter 2023
  18. Machine Learning Method with Applications in Hardware Security of Post-Quantum Cryptography

    Machine learning (ML) is the core of Artificial Intelligence (AI), and it is the fundamental way to make computer have intelligence. ML is a...

    Article 20 March 2023
  19. Getting Started in Cryptography and Cryptanalysis

    Cryptography and cryptanalysis are two fascinating and highly technical disciplines that have played a critical role in modern communication and...
    Marius Iulian Mihailescu, Stefania Loredana Nita in Pro Cryptography and Cryptanalysis with C++23
    Chapter 2023
  20. LightWeight energy-efficient Block Cipher based on DNA cryptography to secure data in internet of medical things devices

    The purpose of this study is to secure data in internet of medical things (IoMT) environment while saving energy to improve objects lifetime....

    Nabila Zitouni, Maamar Sedrati, Amel Behaz in International Journal of Information Technology
    Article 19 October 2023
Did you find what you were looking for? Share feedback.