Search alternatives:
"cryptographer" » "cryptographers", "cryptography", "cryptographic"

1
by Rosenheim, Shawn James
Published 2020
Johns Hopkins University Press
..., but, through his effect on real cryptographers, Poe's writing influenced the outcome of World War II...

2
by Dong, Ling, Chen, Kefei
Published 2012
Springer Berlin Heidelberg
Table of Contents: ...Introduction of Cryptographic Protocol -- Informal Analysis -- Informal Analysis of Cryptographic...

3
by Horváth, Máté, Buttyán, Levente
Published 2020
Springer International Publishing
...This book explains the development of cryptographic obfuscation, providing insight into the most...

4
Published 2009
Springer US
Table of Contents: ...About Cryptographic Engineering -- Random Number Generators for Cryptographic Applications...

5
by Cook, Debra, Keromytis, Angelos D.
Published 2006
Springer US
Table of Contents: ...Graphical Processing Units -- Motivation -- Encryption in GPUs -- Remotely Keyed Cryptographics...

6
by Coyne, Richard
Published 2023
The MIT Press

7
by Ramkumar, Mahalingam
Published 2014
Springer International Publishing

8
by Gutmann, Peter
Published 2004
Springer New York
...A cryptographic security architecture is the collection of hardware and software that protects...

9
by Liu, Leibo, Wang, Bo, Wei, Shaojun
Published 2018
Springer Nature Singapore
Table of Contents: ...Introduction -- Analysis of Reconfigurability of Cryptographic Algorithms -- Hardware Architecture...

10
by Miller, Dr. A. Ray
Published 2006
Center for Cryptologic History, NSA
...The brochure derives for the first time the exact number of theoretical cryptographic key settings...

11
by Luby, Michael
Published 1996
Princeton University Press
... useful cryptographic primitives, such as private key cryptosystems, pseudorandom function generators...

12
by Budaghyan, Lilya
Published 2014
Springer International Publishing
...This book covers novel research on construction and analysis of optimal cryptographic functions...

13
by Kayem, Anne V. D. M., Akl, Selim G., Martin, Patrick
Published 2010
Springer US
...Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so...

15 ... improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware...

16
Published 1999
Springer Berlin Heidelberg
Table of Contents: ... for Cryptographic Applications -- Random Number Generators Founded on Signal and Information Theory -- Cryptographic...

17
Published 2019
Springer International Publishing
Table of Contents: ... of fault attacks on cryptographic hardware implementations -- Part II. Automated Design and Deployment...

18
by Shparlinski, Igor
Published 2003
Birkhäuser
Table of Contents: ... of the Diffie-Hellman Secret Key -- 14 Bit Security of the Diffie-Hellman Secret Key -- IV Other Cryptographic...

19
by Ramakrishnan, Srinivasan
Published 2022
IntechOpen
...In the modern era of digitization, cryptographic techniques are becoming increasingly important...

20
Published 2015
Springer Berlin Heidelberg
...This book constitutes the refereed proceedings of the 17th International Workshop on Cryptographic...