Cryptography

View this topic in
Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφειν, graphein, "writing", or -λογία, -logia, "study", respectively) is the practice and study of hiding information. (Wikipedia.org)






Conferences related to Cryptography

Back to Top

2020 IEEE/PES Transmission and Distribution Conference and Exposition (T&D)

Bi-Annual IEEE PES T&D conference. Largest T&D conference in North America.


2019 56th ACM/IEEE Design Automation Conference (DAC)

EDA (Electronics Design Automation) is becoming ever more important with the continuous scaling of semiconductor devices and the growing complexities of their use in circuits and systems. Demands for lower-power, higher-reliability and more agile electronic systems raise new challenges to both design and design automation of such systems. For the past five decades, the primary focus of research track at DAC has been to showcase leading-edge research and practice in tools and methodologies for the design of circuits and systems.

  • 2022 59th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2021 58th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2020 57th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2018 55th ACM//IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)

    DAC Description for TMRF The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading

  • 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 session on design methodologies and EDA tool developments, keynotes, panels, plus User Track presentations. A diverse worldwide community representing more than 1,000 organization attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2012 49th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 200 of the leading electronics design suppliers

  • 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference is the world s leading technical conference and tradeshow on electronic design and design automation. DAC is where the IC Design and EDA ecosystem learns, networks, and does business.

  • 2010 47th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 200 of the leading electronics design suppliers.

  • 2009 46th ACM/EDAC/IEEE Design Automation Conference (DAC)

    DAC is the premier event for the electronic design community. DAC offers the industry s most prestigious technical conference in combination with the biggest exhibition, bringing together design, design automation and manufacturing market influencers.

  • 2008 45th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 250 of the leading electronics design suppliers.

  • 2007 44th ACM/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier Electronic Design Automation (EDA) and silicon solution event. DAC features over 50 technical sessions covering the latest in design methodologies and EDA tool developments and an Exhibition and Demo Suite area with over 250 of the leading EDA, silicon and IP Providers.

  • 2006 43rd ACM/IEEE Design Automation Conference (DAC)

  • 2005 42nd ACM/IEEE Design Automation Conference (DAC)

  • 2004 41st ACM/IEEE Design Automation Conference (DAC)

  • 2003 40th ACM/IEEE Design Automation Conference (DAC)

  • 2002 39th ACM/IEEE Design Automation Conference (DAC)

  • 2001 38th ACM/IEEE Design Automation Conference (DAC)

  • 2000 37th ACM/IEEE Design Automation Conference (DAC)

  • 1999 36th ACM/IEEE Design Automation Conference (DAC)

  • 1998 35th ACM/IEEE Design Automation Conference (DAC)

  • 1997 34th ACM/IEEE Design Automation Conference (DAC)

  • 1996 33rd ACM/IEEE Design Automation Conference (DAC)


2019 IEEE International Symposium on Electromagnetic Compatibility, Signal & Power Integrity (EMC+SIPI)

The IEEE Electromagnetic Compatibility Society is the world's largest organization dedicated to the development and distribution of information, tools and techniques for reducing electromagnetic interference. The society's field of interest includes standards, measurement techniques and test procedures, instrumentation, equipment and systems characteristics, interference control techniques and components, education, computational analysis, and spectrum management, along with scientific, technical, industrial, professional or other activities that contribute to this field


2019 IEEE International Symposium on High Performance Computer Architecture (HPCA)

HPCA offers a high-quality forum for scientists and engineers to present their latest research findings in the rapidly-changing field of computer architecture.


ICC 2019 - 2019 IEEE International Conference on Communications (ICC)

The 2019 IEEE International Conference on Communications (ICC) will be held from 20-24 May 2019 at Shanghai International Convention Center, China,conveniently located in the East Coast of China, the region home to many of the world’s largest ICT industries and research labs. Themed“Smart Communications”, this flagship conference of IEEE Communications Society will feature a comprehensive Technical Program including16 Symposia and a number of Tutorials and Workshops. IEEE ICC 2019 will also include an attractive Industry Forum & Exhibition Program featuringkeynote speakers, business and industry pan


More Conferences

Periodicals related to Cryptography

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Circuits and Systems I: Regular Papers, IEEE Transactions on

Part I will now contain regular papers focusing on all matters related to fundamental theory, applications, analog and digital signal processing. Part II will report on the latest significant results across all of these topic areas.


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


More Periodicals

Most published Xplore authors for Cryptography

Back to Top

No authors for "Cryptography"


Xplore Articles related to Cryptography

Back to Top

IEE Colloquium on Public Uses of Cryptography (Digest No. 1996/085)

[] IEE Colloquium on Public Uses of Cryptography, 1996

None


The IEE Seminar on Quantum Cryptography: Secure Communications for Business? - Title

[] 2005 The IEE Seminar on Quantum Cryptography: Secure Communications for Business (Ref. No. 2005/11310), 2005

The following topics were dealt with: free space quantum cryptography; PKI; business-to-business security; space systems; quantum key distribution; optical fibre networks; quantum communication; mid-infrared single photon source; and quantum information processing.


ESA studies and future trends in quantum cryptography for space systems

[{u'author_order': 1, u'authorUrl': u'https://ieeexplore.ieee.org/author/37700253000', u'full_name': u'J. Perdigues', u'id': 37700253000}] 2005 The IEE Seminar on Quantum Cryptography: Secure Communications for Business (Ref. No. 2005/11310), 2005

This paper presents a slide presentation on the ESA studies and future trends in quantum key distribution for space systems.


On the Relation of Random Grid and Deterministic Visual Cryptography

[{u'author_order': 1, u'affiliation': u'Dipartimento di Informatica, Universit\xe0 di Salerno, Fisciano, Italy', u'authorUrl': u'https://ieeexplore.ieee.org/author/37621431800', u'full_name': u'Roberto De Prisco', u'id': 37621431800}, {u'author_order': 2, u'affiliation': u'Dipartimento di Informatica, Universit\xe0 di Salerno, Fisciano, Italy', u'authorUrl': u'https://ieeexplore.ieee.org/author/37270822300', u'full_name': u'Alfredo De Santis', u'id': 37270822300}] IEEE Transactions on Information Forensics and Security, 2014

Visual cryptography is a special type of secret sharing. Two models of visual cryptography have been independently studied: 1) deterministic visual cryptography, introduced by Naor and Shamir, and 2) random grid visual cryptography, introduced by Kafri and Keren. In this paper, we show that there is a strict relation between these two models. In particular, we show that to any ...


Secure visual secret sharing scheme for color images using visual cryptography and digital watermarking

[{u'author_order': 1, u'affiliation': u'Department of Computer Sci. & Engg., Jawaharlal Darda Institute of Engg. & Technology, Yavatmal, India', u'authorUrl': u'https://ieeexplore.ieee.org/author/37086001559', u'full_name': u'Jitendra Saturwar', u'id': 37086001559}, {u'author_order': 2, u'affiliation': u'Department of Computer Sci. & Engg., Jawaharlal Darda Institute of Engg. & Technology, Yavatmal, India', u'authorUrl': u'https://ieeexplore.ieee.org/author/37085997994', u'full_name': u'D.N. Chaudhari', u'id': 37085997994}] 2017 Second International Conference on Electrical, Computer and Communication Technologies (ICECCT), 2017

In today's world of digital communication, as technology progresses, there is more and more attention required on image security. Many visual cryptography algorithms have been suggested and digital watermarking in association with visual cryptography is also proposed for more image security. An image watermarking model based on progressive visual cryptography is proposed to decide optimal number of shares. A study ...


More Xplore Articles

Educational Resources on Cryptography

Back to Top

eLearning

No eLearning Articles are currently tagged "Cryptography"

IEEE-USA E-Books

  • A Decade of Lattice Cryptography

    Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn as the foundation for secure cryptographic systems. Attractive features of lattice cryptography include apparent resistance to quantum attacks (in contrast with most number-theoretic cryptography), high asymptotic efficiency and parallelism, security under worst-case intractability assumptions, and solutions to long-standing open problems in cryptography. This monograph surveys most of the major developments in lattice cryptography over the past ten years. The main focus is on the foundational short integer solution (SIS) and learning with errors (LWE) problems (and their more efficient ring-based variants), their provable hardness assuming the worst- case intractability of standard lattice problems, and their many cryptographic applications.

  • Broadband Quantum Cryptography

    Quantum cryptography is a rapidly developing field that draws from a number of disciplines, from quantum optics to information theory to electrical engineering. By combining some fundamental quantum mechanical principles of single photons with various aspects of information theory, quantum cryptography represents a fundamental shift in the basis for security from numerical complexity to the fundamental physical nature of the communications channel. As such, it promises the holy grail of data security: theoretically unbreakable encryption. Of course, implementing quantum cryptography in real broadband communications systems poses some unique challenges, including generating single photons, distilling random keys from the quantum key distribution process, and maintaining security at both the theoretical and practical level. Overall, quantum cryptography has a place in the history of secret keeping as a novel and potentially useful paradigm shift in the approach to broadband data encryption. Table of Contents: Introduction / Elements of Classical Cryptography / The Quantum Mechanics of Photons / Fundamentals of Quantum Key Distribution / Information Theory and Key Reconciliation / Components for Broadband QKD / A Survey of QKD Implementations / Conclusion - QKD in the Marketplace

  • Enhancing Information Security and Privacy by Combining Biometrics with Cryptography

    This book deals with "crypto-biometrics", a relatively new and multi- disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification accuracy, and generation of cryptographically usable keys that are strongly linked to the user identity. In this text, a thorough review of the subject is provided and then some of the main categories are illustrated with recently proposed systems by the authors. Beginning with the basics, this text deals with various aspects of crypto- biometrics, including review, cancelable biometrics, cryptographic key generation from biometrics, and crypto-biometric key sharing protocols. Because of the thorough treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy. Table of Contents: Introduction / Cancelable Biometric System / Cryptographic Key Regeneration Using Biometrics / Biometrics-Based Secure Authentication Protocols / Concluding Remarks

  • Foundations of Cryptography: A Primer

    Foundations of Cryptography surveys the main paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic problems. The author starts by presenting some of the central tools; that is, computational difficulty (in the form of one-way functions), pseudorandomness, and zero-knowledge proofs. Based on these tools, the emphasis is shifted to the treatment of basic applications such as encryption and signature schemes as well as the design of general secure cryptographic protocols. The author has created a unique overview that includes well over 100 references. The accent is on the clarification of fundamental concepts and on demonstrating the feasibility of solving several central cryptographic problems. Foundations of Cryptography is an invaluable resource for all students, researchers and practitioners interested in the foundations that underpin modern cryptography.

  • Quantum Cryptography

    This chapter contains sections titled: * A Brief Overview of RSA Encryption * Basic Quantum Cryptography * An Example Attack: The Controlled NOT Attack * The B92 Protocol * The E91 Protocol (Ekert) * Exercises

  • Introduction

    This chapter contains sections titled: * The Meaning of the Word Cryptography * Symmetric Key Cryptography * Public Key (Asymmetric) Cryptography * Key Establishment * Cryptography��-��More than just Hiding Secrets * Standards * Attacks

  • Cryptography

  • Afterword to “The Future of Cryptography”

    None

  • Elliptic Curve Cryptography

    This chapter contains sections titled: * Elliptic Curves and Elliptic Curve Groups * Elliptic Curve Cryptography * The Elliptic Curve Factoring Scheme

  • IEEE Press Series on Information and Communication Networks Security

    No abstract.



Standards related to Cryptography

Back to Top

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.


IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices

This standard specifies elements of an architecture for cryptographic protection of data on block-oriented storage devices, describing the methods, algorithms, and modes of data protection to be used.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


IEEE Standard for Local and metropolitan area networks - Secure Device Identity

This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.


IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

This standard covers specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363™-2000 and IEEE Std 1363a™-2004.1 It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key ...


More Standards