technical research paper on cryptography

Journal of Cryptology

  • Provides a forum for original results in all areas of cryptology
  • Covers both cryptography and cryptanalysis, including information theoretic and complexity theoretic perspectives
  • Also discusses implementation, application, and standards issues
  • In addition to full-length technical, survey, and historical articles, the journal publishes short notes
  • The official journal of the International Association for Cryptologic Research
  • Vincent Rijmen

Societies and partnerships

New Content Item

Latest articles

Watermarking prfs and pke against quantum adversaries.

  • Fuyuki Kitagawa
  • Ryo Nishimaki

technical research paper on cryptography

Cryptographic Primitives with Hinting Property

  • Navid Alamati
  • Sikhar Patranabis

technical research paper on cryptography

Analysis of Multivariate Encryption Schemes: Application to Dob and \({C}^{*}\)

  • Morten Øygarden
  • Patrick Felke
  • Håvard Raddum

technical research paper on cryptography

Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery

  • Qianqian Yang

technical research paper on cryptography

Bitcoin as a Transaction Ledger: A Composable Treatment

  • Christian Badertscher
  • Ueli Maurer
  • Vassilis Zikas

technical research paper on cryptography

Journal updates

Special issue guidelines, announcement of new editor-in-chief, journal information.

  • ACM Digital Library
  • Current Contents/Engineering, Computing and Technology
  • EI Compendex
  • Google Scholar
  • Japanese Science and Technology Agency (JST)
  • Mathematical Reviews
  • Norwegian Register for Scientific Journals and Series
  • OCLC WorldCat Discovery Service
  • Science Citation Index Expanded (SCIE)
  • TD Net Discovery Service
  • UGC-CARE List (India)

Rights and permissions

Springer policies

© International Association for Cryptologic Research

  • Find a journal
  • Publish with us
  • Track your research

Cloud Cryptography: User End Encryption

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

IMAGES

  1. (PDF) Lightweight Cryptography for IoT: A State-of-the-Art

    technical research paper on cryptography

  2. Survey Paper on Threshold Cryptography

    technical research paper on cryptography

  3. (PDF) Research on Various Cryptography Techniques

    technical research paper on cryptography

  4. Research Papers On Cryptography: Exploring The Secrets.

    technical research paper on cryptography

  5. (PDF) Overview of Cryptography

    technical research paper on cryptography

  6. (PDF) A Review on Cryptography in Cloud Computing

    technical research paper on cryptography

VIDEO

  1. On the Complexity of Collision Resistant Hash Functions... (TCC 2019)

  2. Data Encryption Standard

  3. Modular Arithmetic

  4. Digital Signature

  5. RC4

  6. Learning LaTeX for Research Paper writing using overleaf

COMMENTS

  1. (PDF) A Review Paper on Cryptography

    Cryptography has the importa nt purpose of providing reliabl e, strong, and robust network and data security. In this paper, we. demonstrated a review of some of the research that has been ...

  2. A Review Paper on Cryptography

    A Review Paper on Cryptography Abstract: With the internet having reached a level that merges with our lives, growing explosively during the last several decades, data security has become a main concern for anyone connected to the web. Data security ensures that our data is only accessible by the intended receiver and prevents any modification ...

  3. A New Approach of Cryptography for Data Encryption and Decryption

    Cryptography is the solution to secure data from different security risks. To enhance the security of communication systems better cryptosystems technology is obvious in the area of cryptography. Our research focuses on data encryption and decryption technique for a better cryptosystem; where we have proposed a new approach that ensures better ...

  4. Home

    Journal of Cryptology is a comprehensive source for original results in modern information security. Provides a forum for original results in all areas of cryptology. Covers both cryptography and cryptanalysis, including information theoretic and complexity theoretic perspectives. Also discusses implementation, application, and standards issues ...

  5. An Exploration to the Quantum Cryptography Technology

    The aim of this paper is to explore the knowledge related to the Quantum Cryptography, Quantum Key Distribution; and their elements, implementation, and the latest research. Moreover, exploration of the loopholes and the security of Internet of Things (IoT) infrastructure and current used classical cryptographic algorithms are described in the ...

  6. A review on various cryptographic techniques & algorithms

    This exploration zeroed in on various sorts of cryptography calculations that exist, as AES, DES, 3DES, IDEA, RSA, ECC, Homomorphic and Blowfish and so forth. 1. Introduction. Cryptography is a tool to execute messages confidentiality. In Greek, the word "composing mystery" has a special meaning.

  7. Cryptography: Recent research trends of encrypting mathematics

    Cryptography is the study of assured communication procedure which allows only the sender and the intended person to review the message and the content shared. The simplest method used is the symmetric algorithm in which once the message is encrypted it is sent to the recipient along with its secret key. 2.

  8. Special Issue on Cryptography and Information Security

    Additionally, we examine post-quantum cryptography, a vital area of research in the face of the impending arrival of quantum computers. Another vital aspect of our Special Issue is secure communication protocols. As cyber threats continue to evolve, we explore advances in network security, transport layer security, and end-to-end encryption.

  9. PDF Quantum Cryptography for Enhanced Network Security: A ...

    Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions Mst Shapna Akter∗ ∗Department of Computer Science, Kennesaw State University, USA {∗ [email protected]} Abstract—With the ever-growing concern for internet secu- rity, the field of quantum cryptography emerges as a promis-

  10. PDF Quantum Cryptography

    Quantum cryptography is one of the emerging topics in the field of computer industry. This paper focus on quantum cryptography and how this technology contributes value to a defense-in-depth strategy pertaining to completely secure key distribution. The scope of this paper covers the weaknesses of modern digital cryptosystems, the fundamental ...

  11. Cryptography

    Cryptography. , Volume 6, Issue 1 (March 2022) - 13 articles. Cover Story ( view full-size image ): Anonymous authentication systems have received the attention of many fields, as they secure user privacy. Both group signatures and ring signatures preserve user anonymity, allowing users to hide their identity within a group.

  12. Cryptography

    Cryptography is an international, scientific, peer-reviewed, open access journal on cryptography published quarterly online by MDPI. Open Access — free for readers, with article processing charges (APC) paid by authors or their institutions. High Visibility: indexed within Scopus, ESCI (Web of Science), dblp, and other databases. Rapid ...

  13. Quantum Cryptography for Enhanced Network Security: A Comprehensive

    With the ever-growing concern for internet security, the field of quantum cryptography emerges as a promising solution for enhancing the security of networking systems. In this paper, 20 notable papers from leading conferences and journals are reviewed and categorized based on their focus on various aspects of quantum cryptography, including key distribution, quantum bit commitment, post ...

  14. PDF The Challenges of Bringing Cryptography from Research Papers to

    investigate the challenges involved in bringing cryptography innovations from papers to products. To address this open question, we conducted 21 semi-structured interviews with cryptography experts who possess extensive experience (10+ years) in academia, industry, and nonprofit and governmental organizations. We aimed to gain

  15. Comparative Analysis of Cryptographic Key Management Systems

    Keywords: Cryptography, Key Distribution, Key Management Service, Secret Handling. 1 Introduction The complexity and reliability of any cryptosystem is based on the use of crypto-graphic keys. The key exchange is one of the mechanisms at core of the process and it ensure confidentiality when exchanging information between users and its behaviour is

  16. Cryptography

    Cryptography. , Volume 5, Issue 4 (December 2021) - 13 articles. Cover Story ( view full-size image ): As the demand for wearables and fitness trackers is rising, serious concerns over data privacy and security issues are coming into the spotlight. Individual users' sensitive information, such as heart rate, calories burned, or even sleep ...

  17. Cybersecurity, Cryptography, and Machine Learning

    Feature papers represent the most advanced research with significant potential for high impact in the field. ... Cryptography is one of the most important tools that has been widely deployed by researchers and practitioners in academia and industry to build secure information technology infrastructures ensuring the confidentiality of data and ...

  18. Cloud Cryptography: User End Encryption

    This paper suggests user end cryptography of data before uploading it to a cloud storage service platform like Google Drive, Microsoft, Amazon and CloudSim etc. The proposed cryptography algorithm is based on symmetric key cryptography model and has been implemented on Amazon S3 cloud space service. ... IEEE is the world's largest technical ...

  19. Cryptography

    Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications. ... Public-key cryptography ...