Cryptography.
Overview
Works: | 137 works in 75 publications in 75 languages |
---|
Titles
Cryptography for Internet and database applications :developing secret and public key techniques with Java /
by:
(Language materials, printed)
Wiley survival guide in global telecommunications :broadband access, optical components, and networks, and cryptography /
by:
(Language materials, printed)
Primality testing and integer factorization in public-key cryptography /
by:
(Language materials, printed)
Applied cryptography :protocols, algorithms, and source code in C /
by:
(Language materials, printed)
Wireless security and cryptography :specifications and implementations /
by:
(Language materials, printed)
Physics and theoretical computer sciencefrom numbers and languages to (quantum) cryptography security /
by:
(Electronic resources)
Disappearing cryptographyinformation hiding : steganography & watermarking /
by:
(Electronic resources)
State of the art in applied cryptographycourse on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures /
by:
(Electronic resources)
Fundamentals of cryptologya professional reference and interactive tutorial /
by:
(Electronic resources)
Quantum information, computation and cryptographyan introductory survey of theory, technology and experiments /
by:
(Electronic resources)
Web application obfuscation-/WAFs..Evasion..Filters//alert (/Obfuscation/)- /
by:
(Electronic resources)
Enhancing information security and privacy by combining biometrics with cryptography
by:
(Electronic resources)
Visual cryptography for image processing and securitytheory, methods, and applications /
by:
(Electronic resources)
Abstract algebraapplications to Galois theory, algebraic geometry, and cryptography /
by:
(Electronic resources)
Applied cryptography in .NET and Azure Key Vaulta practical guide to encryption in .NET and .NET Core /
by:
(Electronic resources)
Cryptology and error correctionan algebraic introduction and real-world applications /
by:
(Electronic resources)
Practical cryptography in Pythonlearning correct cryptography by example /
by:
(Electronic resources)
Cryptography with shrinking generatorsfundamentals and applications of keystream sequence generators based on irregular decimation /
by:
(Electronic resources)
New frontiers in cryptographyquantum, blockchain, lightweight, chaotic and DNA /
by:
(Electronic resources)
Cryptography apocalypse :preparing for the day when quantum computing breaks today's crypto /
by:
(Language materials, printed)
International symposium on mathematics, quantum theory, and cryptographyProceedings of MQC 2019 /
by:
(Electronic resources)
Modern cryptographyapplied mathematics for encryption and information security /
by:
(Electronic resources)
Hiding behind the keyboarduncovering covert communication methods with forensic analysis /
by:
(Electronic resources)
Fundamentals of cryptographyintroducing mathematical and algorithmic foundations /
by:
(Electronic resources)
Energy-efficient modular exponential techniques for public-key cryptographyefficient modular exponential techniques /
by:
(Electronic resources)
Cryptography apocalypsepreparing for the day when quantum computing breaks today's crypto /
by:
(Electronic resources)
Algorithms and architectures for cryptography and source coding in non-volatile flash memories
by:
(Electronic resources)
Cryptography and cryptanalysis in MATLABcreating and programming advanced algorithms /
by:
(Electronic resources)
Classical and physical security of symmetric key cryptographic algorithms
by:
(Electronic resources)
Modern cryptography.Volume 1,A classical introduction to informational and mathematical principle
by:
(Electronic resources)
Cryptography and cryptanalysis in Javacreating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 /
by:
(Electronic resources)
Modern cryptographyapplied mathematics for encryption and information security /
by:
(Electronic resources)
Guide to internet cryptographysecurity protocols and real-world attack implications /
by:
(Electronic resources)
Modern cryptography.Volume 2,A classical introduction to informational and mathematical principle
by:
(Electronic resources)
Pro cryptography and cryptanalysis with C++23creating and programming advanced algorithms /
by:
(Electronic resources)
Homomorphic encryption for financial cryptographyrecent inventions and challenges /
by:
(Electronic resources)
Understanding cryptographyfrom established symmetric and asymmetric ciphers to post-quantum algorithms /
by:
(Electronic resources)
Show more
Fewer
Subjects