1
Published 1983
Springer Berlin Heidelberg
Table of Contents: ...Classical Cryptography -- Cryptology - Methods and Maxims -- Mechanical Cryptographic Devices...

2
Published 2002
Springer Berlin Heidelberg
Table of Contents: ... Authentication Protocol -- Anonymity without ‘Cryptography’ -- Fair Tracing without Trustees -- Invited Talk...

3
by Buchmann, Johannes
Published 2001
Springer New York
...Cryptography is a key technology in electronic key systems. It is used to keep data secret...

4
Published 1994
Springer US
..., cryptography, and information theory. The 44 contributions represent a cross-section of the world's leading...

5
by Delfs, Hans, Knebl, Helmut
Published 2002
Springer Berlin Heidelberg
Table of Contents: ...1. Introduction -- 1.1 Encryption and Secrecy -- 1.2 The Objectives of Cryptography -- 1.3 Attacks...

6
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Customer Verification by Query-Directed Passwords -- Invited Talks -- Cryptography and the French Banking...

7
Published 2003
Springer Berlin Heidelberg
Subjects: ...Cryptography...

8
by Buchmann, Johannes
Published 2004
Springer New York
...Cryptography is a key technology in electronic key systems. It is used to keep data secret...

9
Published 2004
Springer US
...Cryptography in Chinese consists of two characters meaning "secret coded". Thanks to Ch'in Chiu...

10
Published 1998
Springer Berlin Heidelberg
Subjects: ...Cryptography...

11
Published 1997
Springer Berlin Heidelberg
Table of Contents: ... cryptosystem for financial applications -- Perspectives on financial cryptography -- Auditable metering...

12
Published 1997
Springer Berlin Heidelberg
Subjects: ...Cryptography...

13
Published 1986
Vieweg+Teubner Verlag

14
Published 2003
Springer Berlin Heidelberg
Table of Contents: ...E-voting without ‘Cryptography’ -- An Implementation of a Universally Verifiable Electronic Voting...

15
Published 2001
Springer Berlin Heidelberg
Subjects: ...Cryptography...

16
Published 2001
Springer Berlin Heidelberg
Table of Contents: ... Selective Payment Protocols -- Financial Cryptography Tools (I) -- Sharing Decryption in the Context...

17
Published 2001
Springer Berlin Heidelberg
Table of Contents: ... Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding -- The Wide Trail...

18
Published 1999
Springer Berlin Heidelberg
Subjects: ...Cryptography...

19
Published 1999
Springer Berlin Heidelberg
Table of Contents: ... for Designs to the Cryptography -- Further Results on the Relation Between Nonlinearity and Resiliency...

20
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... -- Physically Observable Cryptography -- Efficient and Universally Composable Committed Oblivious Transfer...