Electronic Books

Total Books: 1 - 20 /33
A Classical Introduction to Cryptography Exercise Book

A Classical Introduction to Cryptography Exercise Book for A Classical Introduction to Cryptography: Applications for Communications ...

Lee mas
Advances in Cryptology - CRYPTO -87

Zero-knowledge interactive proofsystems are a new technique which can be used as a cryptographic tool for designing provably ...

Lee mas
Advances in Cryptology - EUROCRYPT 90

Eurocrypt is a conference devoted to all aspects of cryptologic research, both theoretical and practical, sponsored by the ...

Lee mas
Advances in Cryptology — CRYPTO’ 86

This book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have ...

Lee mas
An Introduction to Mathematical Cryptography

This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems ...

Lee mas
Coding and Cryptography

This volume contains refereed papers devotedtocodingandcrypto graphy.These papers arethe full versionsof a selectionof the ...

Lee mas
Contemporary Cryptology / Public key encription / Random functions / computational complexity / cryptography / cryptology

The aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent ...

Lee mas
Cryptography Arithmetic : Algorithms and Hardware Architectures

Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, ...

Lee mas
Cryptology and Network Security (vol. # 3810)

Constitutes the refereed proceedings of the Conference on Cryptology and Network Security, 2005. This book covers cryptanalysis, ...

Lee mas
Decrypted Secrets

Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...

Lee mas
Decrypted Secrets

Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...

Lee mas
Information Security and Cryptology - ICISC 2005

This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...

Lee mas
Information Security and Cryptology – ICISC 2006

This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...

Lee mas
Information Security and Privacy (vol. # 3574)

Constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, ...

Lee mas
Information Security and Privacy (vol. # 4058)

The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...

Lee mas
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...

Lee mas
Information Systems Security

This book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS ...

Lee mas
Multimedia Encryption and Watermarking

Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking ...

Lee mas
Multivariate Public Key Cryptosystems

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes ...

Lee mas
Post-Quantum Cryptography : Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings

The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are ...

Lee mas
Total Books: 1 - 20 /33