Showing 1 - 20 results of 464 for search '"cryptography"', query time: 0.25s Refine Results
  1. 1
    Table of Contents: “…Classical cryptography -- Shannon' theory -- The data encryption standard -- The RSA system and factoring -- Other public-key cryptosystems -- Signature schemes -- Hash functions -- Key distribution and key agreement -- Identification schemes -- Authentication codes -- Secret sharing schemes -- Pseudo-random number generation -- Zero-knowledge proofs.…”
    Book
  2. 2
    by Smith, Laurence Dwight
    Published 1955
    Subjects: “…Cryptography. http://id.loc.gov/authorities/subjects/sh85034453…”
    Book
  3. 3
    by Meyer, Carl H.
    Published 1982
    Subjects: “…Cryptography Handbooks, manuals, etc.…”
    Book
  4. 4
    by Buchanan, William
    Published 2017
    Table of Contents:
    Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
    Electronic eBook
  5. 5
    Published 2023
    Table of Contents: “…Deck-function-based Cryptography -- 19.1. Block-cipher centric cryptography -- 19.2. …”
    Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
    Electronic eBook
  6. 6
    Published 2021
    Subjects: “…Cryptography.…”
    Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
    Electronic eBook
  7. 7
  8. 8
    Published 1996
    Connect to this title via ProQuest
    Electronic eBook
  9. 9
    Published 2023
    Table of Contents: “…Introduction to Design in Symmetric Cryptography -- 1.1. Introduction -- 1.2. Cryptographic building blocks -- 1.2.1. …”
    Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
    Electronic eBook
  10. 10
    by Kranakis, Evangelos
    Published 1986
    Subjects:
    Book
  11. 11
    by Welsh, D. J. A.
    Published 1988
    Subjects:
    Book
  12. 12
    by Delfs, Hans, Knebl, Helmut
    Published 2015
    Table of Contents: “…Introduction -- Symmetric-Key Encryption -- Public-Key Cryptography -- Cryptographic Protocols -- Probabilistic Algorithms -- One-Way Functions and the Basic Assumptions -- Bit Security of One-Way Functions -- One-Way Functions and Pseudorandomness -- Provably Secure Encryption -- Unconditional Security of Cryptosystems -- Provably Secure Digital Signatures -- App. …”
    Connect to this title online
    Electronic eBook
  13. 13
    by Trappe, Wade
    Published 2006
    Table of Contents: “…Overview of Cryptography and Its Applications.…”
    Book
  14. 14
  15. 15
    by Schneier, Bruce, 1963-
    Published 1996
    Subjects:
    Book
  16. 16
    Published 1998
    Conference Proceeding Book
  17. 17
    by Ferguson, Niels
    Published 2010
    Table of Contents: “…Introduction: The context of cryptography -- Introduction to cryptography -- Pt. 2. …”
    Book
  18. 18
  19. 19
    Published 2015
    Table of Contents: “…Authentication -- Symmetric cryptography -- 2-party computation -- Codes -- Boolean functions -- Information theory -- Leakage resilience.…”
    Connect to this title online
    Electronic eBook
  20. 20
    by Delfs, Hans
    Published 2002
    Subjects:
    Book