Treffer 1 - 20 von 364

2

Practical Cryptography in Python: Learning Correct Cryptography by Example
Seth James Nielson ; Christopher K. Monson ; Seth James Nielson ; et al.

Buch
Zu den Favoriten
3

Unveiling Malicious Logic: Towards a Statement-Level Taxonomy and Dataset for Securing Python Packages
Ryan, Ahmed ; Ifti, Junaid Mansur ; Erfan, Md ; et al.

Cryptography and Securit...
Report
Zu den Favoriten
4

Case Study: Fine-tuning Small Language Models for Accurate and Private CWE Detection in Python Code
Bappy, Md. Azizul Hakim ; Mustafa, Hossen A ; Saha, Prottoy ; et al.

Computer Science - Crypt... Computer Science - Artif...
Report
Zu den Favoriten
5

Leveraging Large Language Models for Command Injection Vulnerability Analysis in Python: An Empirical Study on Popular Open-Source Projects
Wang, Yuxuan ; Chen, Jingshu ; Wang, Qingyang

Computer Science - Softw... Computer Science - Artif... Computer Science - Crypt...
Report
Zu den Favoriten
6

pracy: A Practical Compiler for Attribute-Based Encryption in Python
Sven Argo ; Marloes Venema ; Adrian Ackermann ; et al.
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 4 (2025)

attribute-based encrypti... implementation compiler automation Computer engineering. Co... TK7885-7895
Fachzeitschrift
Zu den Favoriten
7

Homomorphic cryptography: Challenges and perspectives
Hariss, Khalil ; Yaacoub, Jean Paul A. ; Noura, Hassan N.
In Computer Science Review February 2026 59

Fachzeitschrift
Zu den Favoriten
8

Exploiting the Potential of Linearity in Automatic Differentiation and Computational Cryptography
Giusti, Giulia

Cryptography and Securit... Logic in Computer Scienc... Programming Languages
Report
Zu den Favoriten
10

Module-Lattice-Based Key-Encapsulation Mechanism Performance Measurements.
Nagy, Naya ; Alnemer, Sarah ; Alshuhail, Lama Mohammed ; et al.
Sci (2413-4155); Sep2025, Vol. 7 Issue 3, p91, 31p

CRYPTOGRAPHY INTERNET of things COMPUTATIONAL complexity PYTHON programming langu... BENCHMARK problems (Comp...
Fachzeitschrift
Zu den Favoriten
11

pycastx: A Python library for lightweight data encryption in IoT using ECC and metaheuristics based high-entropy keys and dynamic S-Box
Salman Ali ; Md Asdaque Hussain ; Faisal Anwer ; et al.
SoftwareX, Vol 31, Iss , Pp 102321- (2025)

Dynamic S-Box Elliptic curve cryptogra... Entropy Genetic algorithm Internet of things (IoT) Computer software
Fachzeitschrift
Zu den Favoriten
12

ElGamal Cryptosystem for Image Encryption and Decryption.
Narasimha Bhaskar, Bheesetti ; Bindhu Priya, P.
International Scientific Journal of Engineering & Management; Jul2025, Vol. 4 Issue 7, p1-9, 9p

IMAGE encryption CRYPTOGRAPHY PYTHON programming langu... ALGORITHMS MEMORY
Fachzeitschrift
Zu den Favoriten
13

The Design of an Undergraduate Cryptography Course with Python and SageMath
Catherine Barbara Acitelli
214

Undergraduate Study Curriculum Design Technology Coding Programming Programming Languages
Dissertation
Zu den Favoriten
14

Automatic Generation of a Cryptography Misuse Taxonomy Using Large Language Models
Zhang, Yang ; Ouyang, Wenyi ; Zhang, Yi ; et al.

Cryptography and Securit...
Report
Zu den Favoriten
15

Performing Classical and Post-Quantum Cryptography on IoT Data: An Evaluation.
Rawal, Darshana ; Seedorf, Jan ; Jha, Nikhil
International Archives of the Photogrammetry, Remote Sensing & Spatial Information Sciences; 2025, Vol. 48 Issue 4/W16, p91-97, 7p

INTERNET of things CRYPTOGRAPHY SECURITY systems RESOURCE allocation RASPBERRY Pi COMPUTER performance
Fachzeitschrift
Zu den Favoriten
16

Practical Timing Side Channel Attacks on Memory Compression
Schwarzl, Martin ; Borrello, Pietro ; Saileshwar, Gururaj ; et al.

Computer Science - Crypt...
Report
Zu den Favoriten
17

Taxonomy and Practical Evaluation of Primality Testing Algorithms
AbuDaqa, Anas ; Abu-Hassan, Amjad ; Imam, Muhammad

Computer Science - Crypt... Mathematics - Number The...
Report
Zu den Favoriten
18

Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection
Demetrio, Luca ; Coull, Scott E. ; Biggio, Battista ; et al.
ACM Transactions on Privacy and Security, 2021

Computer Science - Crypt... Computer Science - Machi...
Report
Zu den Favoriten
19

Hands-On Cryptography with Python
Bowne, Samuel ; Bowne, Samuel ; Bowne, Samuel ; et al.

E-Ressource
Zu den Favoriten
20

Practical Aspect of Privacy-Preserving Data Publishing in Process Mining
Rafiei, Majid ; van der Aalst, Wil M. P.

Computer Science - Crypt...
Report
Zu den Favoriten

Filter