Search
Search Results
-
Historical notes on Russian cryptography
The article is devoted to the main milestones in the development of encryption techniques and mathematical methods of cryptography in Russia from the...
-
An Introduction to Classical and Modern Cryptography
The remote environment bounded us to share information, documents, money, etc. with the help of applications, devices, and tools. The information,... -
Mathematical Foundation for Classical and Modern Cryptography
The design of public-key cyphers prevents knowledge of the encryption key from revealing the identity of the decryption key. Making advantage of a... -
Cryptography
This chapter describes the basic techniques of cryptography as a tool to ensure confidentiality of data. -
Cryptography
Bitcoin gave rise to the specific type of virtual currency known as cryptocurrency. The reason for this name is the extended use of cryptography. A... -
Implementing Post-quantum Cryptography for Developers
Widely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose...
-
Applied Cryptography
This chapter illustrates how cryptography can be used to achieve aims other than confidentiality of data. In particular, it can be used to ensure:... -
A novel secure cryptography model for data transmission based on Rotor64 technique
In recent years, there have been many Security vulnerabilities that threaten user security, these threats have led to the finding of user files, so...
-
Classical and Modern Cryptography for Beginners
This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or...
-
Cryptography
As society speeds, and in most cases is literally dragged, into the new information society, the kind of face-to-face and paper-traceable... -
Quantum-safe cryptography: crossroads of coding theory and cryptography
We present an overview of quantum-safe cryptography (QSC) with a focus on post-quantum cryptography (PQC) and information-theoretic security. From a...
-
TEXCEL: text encryption with elliptic curve cryptography for enhanced security
Elliptic curve cryptography has emerged as a potent tool for safeguarding data communications. This research paper addresses the problem of...
-
Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis
In today's interconnected world, safeguarding digital data's confidentiality and security is crucial. Cryptography and steganography are two primary...
-
Cryptography Foundations
This chapter introduces the concept of cryptography, or mathematical codes used to protect data. It can be a tough concept. To help make this concept... -
Cryptography Fundamentals
Cryptographic history is incredibly long and fascinating. The Code Book: The Secrets Behind Codebreaking [1] is a comprehensive reference that... -
Understanding Cryptography From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms
Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even... -
Lattice-based Cryptography
This chapter has an overview of lattice-based cryptography. You learn why lattices are important in cryptography and their challenges. Furthermore,... -
Machine Learning Method with Applications in Hardware Security of Post-Quantum Cryptography
Machine learning (ML) is the core of Artificial Intelligence (AI), and it is the fundamental way to make computer have intelligence. ML is a...
-
Getting Started in Cryptography and Cryptanalysis
Cryptography and cryptanalysis are two fascinating and highly technical disciplines that have played a critical role in modern communication and... -
LightWeight energy-efficient Block Cipher based on DNA cryptography to secure data in internet of medical things devices
The purpose of this study is to secure data in internet of medical things (IoMT) environment while saving energy to improve objects lifetime....