-
81
-
82
-
83
-
84
-
85
Use of Cryptography in Cloud Computing
Published 2013“…Therefore, in this paper different cryptography aspects that pose a threat to cloud computing are reviewed. …”
Get full text
Conference or Workshop Item -
86
Cryptography using Automata Theory
Published 2022-01-01“…Encryption and decryption are the two most crucial components of cryptography. Data protection is the main objective of both systems. …”
Get full text
Article -
87
Acknowledgement to Reviewers of Cryptography in 2018
Published 2019-01-01“…Cryptography…”
Get full text
Article -
88
-
89
Artificial intelligence and quantum cryptography
Published 2024-02-01“…This summary highlights the key themes in the intersection of AI and quantum cryptography, including the potential benefits of AI-driven cryptography, the challenges that need to be addressed, and the prospects of this interdisciplinary research area.…”
Get full text
Article -
90
Subliminal Channels in Visual Cryptography
Published 2022-09-01Subjects: “…visual cryptography…”
Get full text
Article -
91
Cryptography from information loss
Published 2021“…We show that such reductions, when they exist, have interesting and powerful consequences for lifting hardness into “useful” hardness, namely cryptography. Our first, conceptual, contribution is a definition of lossy reductions in the language of mutual information. …”
Get full text
Article -
92
Cryptography from information loss
Published 2022“…We show that such reductions, when they exist, have interesting and powerful consequences for lifting hardness into “useful” hardness, namely cryptography. Our first, conceptual, contribution is a definition of lossy reductions in the language of mutual information. …”
Get full text
Article -
93
-
94
-
95
-
96
-
97
Eavesdropping on practical quantum cryptography
Published 2003“…Practical implementations of quantum cryptography use attenuated laser pulses as the signal source rather than single photons. …”
Journal article -
98
Free will in device-independent cryptography
Published 2014“…<p>Device-independent cryptography provides security in various tasks whilst removing an assumption that cryptographers previously thought of as crucial -- complete trust in the machinations of their experimental apparatus. …”
Thesis -
99
Artificial intelligence and quantum cryptography
Published 2024“…This summary highlights the key themes in the intersection of AI and quantum cryptography, including the potential benefits of AI-driven cryptography, the challenges that need to be addressed, and the prospects of this interdisciplinary research area.…”
Journal article -
100