Cryptography.
Overview
Works: | 171 works in 61 publications in 61 languages |
---|
Titles
Applied cryptography : = protocols, algorithms, and source code in C /
by:
(Language materials, printed)
Disappearing cryptography : = information hiding : steganography & watermarking /
by:
(Language materials, printed)
State of the art in applied cryptography = course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures /
by:
(Language materials, printed)
Wireless security and cryptography = specifications and implementations /
by:
(Language materials, printed)
Abstract algebra : = applications to Galois theory, algebraic geometry and cryptography /
by:
(Language materials, printed)
Enhancing information security and privacy by combining biometrics with cryptography
by:
(Electronic resources)
Cryptography with shrinking generators = fundamentals and applications of keystream sequence generators based on irregular decimation /
by:
(Electronic resources)
Hiding behind the keyboard = uncovering covert communication methods with forensic analysis /
by:
(Electronic resources)
Cryptography apocalypse = preparing for the day when quantum computing breaks today's crypto /
by:
(Electronic resources)
Algorithms and architectures for cryptography and source coding in non-volatile flash memories
by:
(Electronic resources)
Cryptography and cryptanalysis in MATLAB = creating and programming advanced algorithms /
by:
(Electronic resources)
Crypto : = how the code rebels beat the government, saving privacy in the digital age /
by:
(Language materials, printed)
New frontiers in cryptography = quantum, blockchain, lightweight, chaotic and DNA /
by:
(Electronic resources)
Intelligent Energy-Efficient Drones: Path Planning, Real-Time Monitoring and Decision-Making.
by:
(Electronic resources)
Modern cryptography.. Volume 1,. A classical introduction to informational and mathematical principle
by:
(Electronic resources)
Modern cryptography.. Volume 2,. A classical introduction to informational and mathematical principle
by:
(Electronic resources)
Pro cryptography and cryptanalysis with C++23 = creating and programming advanced algorithms /
by:
(Electronic resources)
Guide to internet cryptography = security protocols and real-world attack implications /
by:
(Electronic resources)
Number theoretic methods in cryptography : = complexity lower bounds /
by:
(Language materials, printed)
Fundamentals of cryptology : = a professional reference and interactive tutorial /
by:
(Language materials, printed)
Applied cryptography : = protocols, algorithms, and source code in C /
by:
(Language materials, printed)
Codes and ciphers : = Julius Caesar, the Enigma and the internet /
by:
(Language materials, printed)
Cryptography, information theory, and error-correction : = a handbook for the 21st century /
by:
(Language materials, printed)
Fundamentals of cryptology = a professional reference and interactive tutorial /
by:
(Language materials, printed)
Disappearing cryptography = information hiding : steganography & watermarking /
by:
(Language materials, printed)
Complexity Theory and Cryptology = An Introduction to Cryptocomplexity /
by:
(Language materials, printed)
Physics and theoretical computer science = from numbers and languages to (quantum) cryptography security /
by:
(Language materials, printed)
Primality testing and integer factorization in public-key cryptography
by:
(Language materials, printed)
Understanding cryptography = a textbook for students and practitioners /
by:
(Language materials, printed)
Disappearing cryptography = information hiding : steganography & watermarking /
by:
(Language materials, printed)
Lectures on data security = modern cryptology in theory and practice /
by:
(Language materials, printed)
Quantum information, computation and cryptography = an introductory survey of theory, technology and experiments /
by:
(Language materials, printed)
Efficient secure two-party protocols = techniques and constructions /
by:
(Language materials, printed)
Applied cryptography for cyber security and defense = information encryption and cyphering /
by:
(Electronic resources)
Chaos synchronization and cryptography for secure communications = applications for encryption /
by:
(Electronic resources)
Non-commutative cryptography and complexity of group-theoretic problems /
by:
(Language materials, printed)
Everyday cryptography : = fundamental principles and applications /
by:
(Language materials, printed)
Web application obfuscation DUP_1 = -/WAFs..Evasion..Filters//alert (/Obfuscation/)- /
by:
(Electronic resources)
Visual cryptography for image processing and security = theory, methods, and applications /
by:
(Electronic resources)
Abstract algebra = applications to Galois theory, algebraic geometry, and cryptography /
by:
(Electronic resources)
Applied cryptography in .NET and Azure Key Vault = a practical guide to encryption in .NET and .NET Core /
by:
(Electronic resources)
Practical cryptography in Python = learning correct cryptography by example /
by:
(Electronic resources)
International symposium on mathematics, quantum theory, and cryptography = Proceedings of MQC 2019 /
by:
(Electronic resources)
Modern cryptography = applied mathematics for encryption and information security /
by:
(Electronic resources)
Quantum cryptography = from key distribution to conference key agreement /
by:
(Electronic resources)
Fundamentals of cryptography = introducing mathematical and algorithmic foundations /
by:
(Electronic resources)
Energy-efficient modular exponential techniques for public-key cryptography = efficient modular exponential techniques /
by:
(Electronic resources)
Cryptography, information theory, and error-correction : = a handbook for the 21st century /
by:
(Language materials, printed)
Cryptography and cryptanalysis in Java = creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 /
by:
(Electronic resources)
Modern cryptography = applied mathematics for encryption and information security /
by:
(Electronic resources)
Homomorphic encryption for financial cryptography = recent inventions and challenges /
by:
(Electronic resources)
An Enhanced Fully Homomorphic Encryption Scheme for Cloud Computing Using Residue Number System.
by:
(Electronic resources)
Enhanced Symmetric Based Fully Homomorphic Encryption Using Residue Number System.
by:
(Electronic resources)
Adaptive Quality of Service and Trust Based Lightweight Secure Routing Algorithm for Dense Wireless Sensor Networks.
by:
(Electronic resources)
Algorithms for Abelian Surfaces over Finite Fields and Their Applications to Cryptography.
by:
(Electronic resources)
The Design of an Undergraduate Cryptography Course with Python and SageMath.
by:
(Electronic resources)
Classical and physical security of symmetric key cryptographic algorithms
by:
(Electronic resources)
Fundamentals of cryptology = a professional reference and interactive tutorial /
by:
(Language materials, printed)
Cryptology and error correction = an algebraic introduction and real-world applications /
by:
(Electronic resources)
Show more
Fewer
Subjects