Cryptography or cryptology (from Ancient Greek: κρυπτός, romanized: kryptós “hidden, secret”; and γράφειν graphein, “to write”, or -λογία -logia, “study”, respectively) is the practice and study of techniques for secure communication in the presence of third parties called adversaries.

Quantum Cryptography for Nuclear Command and Control
free download

The nuclear inventory of Russia and the USA currently comprises 1 685 warheads in a large network of vehicles; and the interconnected network is managed by a command and control communication system. This command and control communication system (C3) must

A Bibliography of Publications on Cryptography : 1990 1999
free download

Nelson HF Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM

A Bibliography of Publications on Cryptography : 2000 2009
free download

Review on secured data capabilities of cryptography , steganography, and watermarking domain
free download

Due to the increment of using Internet to transfer the critical and secret data, many studies interested in secured data and investigated many ways to secure the transferred information. This paper presents a review study on the field that used in a secured data domain. The

Synthesis of Flexible Accelerators for Early Adoption of Ring-LWE Post-quantum Cryptography
free download

We validate our methodology by integrating our accelerators into an HLS-based SoC infrastructure based on the X86 processor and evaluate overall performance. Our experiments demonstrate the suitability of the approach and allow us to collect insightful

Design and Implementation of Text Cryptography for Multi-Languages and Resolving Type Cast Issues
free download

In todays world of internet data communication is very important and the whole world is running over that only. If two countries need to share the information or if they have to discuss anything related to counter the terrorism around the globe, discussion about the

Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA
free download

This paper presents a set of efficient and parameterized hardware accelerators that target post-quantum lattice-based cryptographic schemes, including a versatile cSHAKE core, a binary-search CDT-based Gaussian sampler, and a pipelined NTT-based polynomial