Cryptography

View this topic in
Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφειν, graphein, "writing", or -λογία, -logia, "study", respectively) is the practice and study of hiding information. (Wikipedia.org)


Conferences related to Cryptography

Back to Top

2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)

The International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) is an annual academic conference in the wireless research arena organized by the Institute of Electrical and Electronics Engineers' Communications Society. This event has emerged as one of the Communications Society flagship conferences in telecommunications with a long history of bringing together academia, industry and regulatory bodies.

  • 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)

    The annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) is one of the premier conferences in the wireless research arena and has a long history of bringing together academia, industry and regulatory bodies. Today, it has become one of the IEEE Communication Society s flagship conferences in wireless networking. After a long absence from the UK, this important wireless event will be returning to London in 2013. PIMRC 2013 will include technical sessions, tutorial

  • 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC 2012)

    PIMRC conference enjoys today wide respect and represents a new trend in international conferences, one which is well suited to the evolving global market. It is uniquely identified by the following features: balance among academia, industry, and governmental organizations; international technical program; flexible organization.

  • 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC 2011)

    IEEE PIMRC is one of the premier conferences in the wireless research arena and has a long history of bringing together academia, industry and regulatory bodies. PIMRC 2011 will include a broad range of topics ranging from physical layer to emerging application technologies. The program will showcase scientific excellence and technological achievements in present and future wireless communications.

  • 2010 IEEE 21st International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC 2010)

    PIMRC shall expose scientific excellence and technological achievements in present and future wireless communications.

  • 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC 2009)

    The PIMRC Symposia started in London in 1990 and we are very honored to host the memorial 20th PIMRC Symposium in Japan. The conference has had continuing success in getting high quality papers presented. It provides the ideal forum for the exchange of the most advanced academic and industry R&D information.


2014 IEEE Information Theory Workshop (ITW)

ITW2014 is a forum for technical exchange among scientists and engineers working on the fundamentals of information theory. The agenda is broad and will cover the diverse topics that information theory presently impacts. There will be both invited and contributed sessions.

  • 2012 IEEE Information Theory Workshop (ITW 2012)

    The past decade has seen an exponential increase in the data stored in distributed locations in various forms including corporate & personal data, multimedia, and medical data in repositories. The grand challenge is to store, process and transfer this massive amount of data, efficiently and securely over heterogeneous communication networks.

  • 2010 IEEE Information Theory Workshop (ITW 2010)

    Algebraic Methods in Communications Technology

  • 2009 IEEE Information Theory Workshop (ITW 2009)

    Covers the most relevant topics in Information Theory and Coding Theory of interest to the most recent applications to wireless networks, sensor networks, and biology

  • 2008 IEEE Information Theory Workshop (ITW 2008)

    This workshop will take a brief look into the recent information theory past to commemorate the 60th anniversary of Shannon's landmark paper, and then proceed to explore opportunities for information theory research in quantum computation, biology, statistics, and computer science.

  • 2006 IEEE Information Theory Workshop (ITW 2006)


2014 IEEE International Symposium on Information Theory (ISIT)

Annual international symposium on processing, transmission, storage, and use of information, as well as theoretical and applied aspects of coding, communications, and communications networks.


2013 13th Canadian Workshop on Information Theory (CWIT)

The 13th Canadian Workshop on Information Theory will take place in Toronto, Ontario, Canada from Tuesday, May 28, to Friday, May 31, 2013. Previously unpublished contributions from a broad range of topics in information theory and its applications are solicited, including (but not limited to) the following areas: Coded modulation, Coding theory and practice, Communication complexity, Communication systems, Cryptology and data security, Data compression, Detection and estimation, Information theory and stat

  • 2011 12th Canadian Workshop on Information Theory (CWIT)

    Applications and practice of information theory

  • 2009 11th Canadian Workshop on Information Theory (CWIT)

    This workshop provides an opportunity for researchers in Information Theory to meet and discuss aspects of their work.

  • 2007 10th Canadian Workshop on Information Theory (CWIT)


2013 23rd International Conference on Field Programmable Logic and Applications (FPL)

The objective of FPL is to bring together researchers and industry from all over the world for a wide ranging discussion on FPGAs, including, but not limited to: applications, advanced electronic design automation (EDA), novel system architectures, embedded processors, arithmetic, and dynamic reconfiguration. The conference topics include, but are not limited to: Architectures; Design Methods and Tools; Applications (aerospace and automotive, bioinformatics, finance, medical, security); Surveys, Trends an

  • 2012 22nd International Conference on Field Programmable Logic and Applications (FPL)

    Applications, advanced electronic design automation (EDA), novel system architectures, embedded processors, arithmetic, and dynamic reconfiguration of field programmable logic.

  • 2011 International Conference on Field Programmable Logic and Applications (FPL)

    FPL is the first and largest conference covering the rapidly growing area of field-programmable logic. Its objective is to bring together researchers and industry from all over the world for a wide ranging discussion on FPGAs, including, but not limited to: applications, advanced electronic design automation (EDA), novel system architectures, embedded processors, arithmetic, and dynamic reconfiguration.

  • 2010 International Conference on Field Programmable Logic and Applications (FPL)

    The conference objective is to bring together researchers and industry from all over the world for a wide ranging discussion of FPGAs and other field-programmable devices, their architectures and design methods, including, but not limited to: applications, advanced electronic design automation (EDA), novel system architectures, embedded processors, arithmetic, dynamic reconfiguration, etc.

  • 2009 International Conference on Field Programmable Logic and Applications (FPL)

    The conference objective is to bring together researchers and industry from all over the world for a wide ranging discussion of FPGAs and other field-programmable devices, their architectures and design methods, including, but not limited to: applications, advanced electronic design automation (EDA), novel system architectures, embedded processors, arithmetic, dynamic reconfiguration, etc.


More Conferences

Xplore Articles related to Cryptography

Back to Top

Limitations of Quantum & the Versatility of Classical Cryptography: A Comparative Study

Vignesh, R.S.; Sudharssun, S.; Kumar, K.J.J. Environmental and Computer Science, 2009. ICECS '09. Second International Conference on, 2009

Cryptography in simple words is an `rt or science of protecting data'. But it's an art which is yet to achieve perfection. The major challenge being faced by it is the intelligence and computational capability of the hacker. All these years the scientists have been working on increasing the computational complexity, but the recent concept of quantum cryptography has added ...


Mobile ad-hoc network key management with certificateless cryptography

Zhenfei Zhang; Susilo, W.; Raad, R. Signal Processing and Communication Systems, 2008. ICSPCS 2008. 2nd International Conference on, 2008

In this paper, we present an idea of adopting certificateless public key encryption (CL-PKE) schemes over mobile ad hoc network (MANET), which has not been explored before. In current literature, essentially there exists two main approaches, namely the public key cryptography and identity-based (ID-based) cryptography. Unfortunately, they both have some inherent drawbacks. In the public key cryptography system, a certificate ...


A JCA-based implementation framework for threshold cryptography

Huang, Y.; Rine, D.; Xunhua Wang Computer Security Applications Conference, 2001. ACSAC 2001. Proceedings 17th Annual, 2001

The Java Cryptography Architecture, JCA in short, was created to allow JCA- compliant cryptography providers to be plugged into a JCA-aware application at run time. This configurable feature makes JCA widely used and assures its success. However, the public key cryptographic service interfaces defined by JCA are based on the conventional public key cryptography, which is a single- sender-single-receiver model, ...


ACS: An efficient address based cryptography scheme for Mobile ad hoc networks security

Macedo Arokiaraj, A.R.; Shanmugam, A. Computer and Communication Engineering, 2008. ICCCE 2008. International Conference on, 2008

Providing security support for mobile ad hoc networks (MANETs) is challenging task. Masquerading and eavesdropping are major threats to the security of wireless communications and mobile networks. The scheme proposed in this paper describes the framework to solve the security threats by designing a address based cryptography scheme. An address-based cryptography scheme (ACS) as a combination of ad hoc node ...


Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography

Byoungcheon Lee Availability, Reliability, and Security, 2010. ARES '10 International Conference on, 2010

Certificate-based cryptography and ID-based cryptography have been designed under different theoretical backgrounds and they have their own advantages and drawbacks, but there have been few works which try to provide them together in an efficient way. Chen et al. considered a hybrid scheme of public key infrastructure (PKI) and ID-based encryption (IBE), and also discussed various trust relationship among multiple ...


More Xplore Articles

Jobs related to Cryptography

Back to Top

Educational Resources on Cryptography

Back to Top

eLearning

OPSEC-based RFID Security: Cryptography

Myerson, Judith OPSEC-based RFID Security: Cryptography, 2010

This tutorial reviews the topic of operational security-based radio frequency identification security with a focus on cryptography. It is divided into two main section. In the first section, we focus on three main topics: OPSEC indicators and process; RFID attack examples; and RFID mapping to IPv6. Explanations and examples will be provided. In the second section, we discuss what we ...


Security of Information and Communication Networks Part 2

Kartalopoulos, Stamatios Security of Information and Communication Networks Part 2, 2010

The delivery of private or secret messages has been an issue of concern regardless of method of transport. Since antiquity, it was risky to send a message with a messenger without compromise. As a result, certain methods were developed to assure unintelligibility of a message if in enemy hands or to indicate to the rightful recipient that the message has ...


Security of Information and Communication Networks Part 1

Kartalopoulos, Stamatios Security of Information and Communication Networks Part 1, 2010

The delivery of private or secret messages has been an issue of concern regardless of method of transport. Since antiquity, it was risky to send a message with a messenger without compromise. As a result, certain methods were developed to assure unintelligibility of a message if in enemy hands or to indicate to the rightful recipient that the message has ...


IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Cryptography"

IEEE-USA E-Books

No IEEE-USA E-Books are currently tagged "Cryptography"



Standards related to Cryptography

Back to Top

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.


IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices

This standard specifies elements of an architecture for cryptographic protection of data on block-oriented storage devices, describing the methods, algorithms, and modes of data protection to be used.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

This standard covers specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363™-2000 and IEEE Std 1363a™-2004.1 It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key ...


IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices

Specifications of common public-key cryptographic techniques based on hard problems over lattices supplemental to those considered in IEEE 1363 and IEEE P1363a, including mathematical primitives for secret value (key) derivation, public-key encryption, identification and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is ...


More Standards

Periodicals related to Cryptography

Back to Top

Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Consumer Electronics, IEEE Transactions on

The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Information Theory, IEEE Transactions on

The fundamental nature of the communication process; storage, transmission and utilization of information; coding and decoding of digital and analog communication transmissions; study of random interference and information-bearing signals; and the development of information-theoretic techniques in diverse areas, including data communication and recording systems, communication networks, cryptography, detection systems, pattern recognition, learning, and automata.


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...


More Periodicals