Suggested Topics within your search.
Suggested Topics within your search.
Cryptography
189
Computer security
105
Computer science
78
Data encryption (Computer science)
71
Computer Science
69
Computer networks
61
History
59
Mathematics
51
Systems and Data Security
51
World War, 1939-1945
50
Security measures
45
Data Encryption
42
Algorithms
30
Computer Communication Networks
28
Engineering
27
Algorithm Analysis and Problem Complexity
25
Artificial intelligence
25
Computers
25
Coding theory
23
Management information systems
20
Management of Computing and Information Systems
20
Military intelligence
19
Number theory
19
Artificial Intelligence (incl. Robotics)
18
Ciphers
16
Discrete Mathematics in Computer Science
16
Coding and Information Theory
14
Data protection
14
Number Theory
14
Computational intelligence
13
-
1by Stinson, Douglas R. (Douglas Robert), 1956-Table of Contents: “…Classical cryptography -- Shannon' theory -- The data encryption standard -- The RSA system and factoring -- Other public-key cryptosystems -- Signature schemes -- Hash functions -- Key distribution and key agreement -- Identification schemes -- Authentication codes -- Secret sharing schemes -- Pseudo-random number generation -- Zero-knowledge proofs.…”
Published 1995
Book -
2by Smith, Laurence DwightSubjects: “…Cryptography. http://id.loc.gov/authorities/subjects/sh85034453…”
Published 1955
Book -
3
-
4by Buchanan, WilliamTable of Contents: Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
Published 2017
Electronic eBook -
5Published 2023Table of Contents: “…Deck-function-based Cryptography -- 19.1. Block-cipher centric cryptography -- 19.2. …”
Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
Electronic eBook -
6Published 2021Subjects: “…Cryptography.…”
Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
Electronic eBook -
7by Grimes, Roger A.Table of Contents: Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
Published 2020
Electronic eBook -
8
-
9Published 2023Table of Contents: “…Introduction to Design in Symmetric Cryptography -- 1.1. Introduction -- 1.2. Cryptographic building blocks -- 1.2.1. …”
Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
Electronic eBook -
10
-
11
-
12Table of Contents: “…Introduction -- Symmetric-Key Encryption -- Public-Key Cryptography -- Cryptographic Protocols -- Probabilistic Algorithms -- One-Way Functions and the Basic Assumptions -- Bit Security of One-Way Functions -- One-Way Functions and Pseudorandomness -- Provably Secure Encryption -- Unconditional Security of Cryptosystems -- Provably Secure Digital Signatures -- App. …”
Connect to this title online
Electronic eBook -
13by Trappe, WadeTable of Contents: “…Overview of Cryptography and Its Applications.…”
Published 2006
Book -
14
-
15
-
16Published 1998Conference Proceeding Book
-
17by Ferguson, NielsTable of Contents: “…Introduction: The context of cryptography -- Introduction to cryptography -- Pt. 2. …”
Published 2010
Book -
18
-
19Published 2015Table of Contents: “…Authentication -- Symmetric cryptography -- 2-party computation -- Codes -- Boolean functions -- Information theory -- Leakage resilience.…”
Connect to this title online
Electronic eBook -
20