Search alternatives:
"cryptographer" » "cryptographers", "cryptography", "cryptographic"

1
by Coyne, Richard
Published 2023
The MIT Press

2
by Rosenheim, Shawn James
Published 2020
Johns Hopkins University Press
..., but, through his effect on real cryptographers, Poe's writing influenced the outcome of World War II...

3
Published 2009
Springer US
Table of Contents: ...About Cryptographic Engineering -- Random Number Generators for Cryptographic Applications...

4
by Horváth, Máté, Buttyán, Levente
Published 2020
Springer International Publishing
...This book explains the development of cryptographic obfuscation, providing insight into the most...

5
by Dong, Ling, Chen, Kefei
Published 2012
Springer Berlin Heidelberg
Table of Contents: ...Introduction of Cryptographic Protocol -- Informal Analysis -- Informal Analysis of Cryptographic...

6
by Cook, Debra, Keromytis, Angelos D.
Published 2006
Springer US
Table of Contents: ...Graphical Processing Units -- Motivation -- Encryption in GPUs -- Remotely Keyed Cryptographics...

7
by Miller, Dr. A. Ray
Published 2006
Center for Cryptologic History, NSA
...The brochure derives for the first time the exact number of theoretical cryptographic key settings...

8
by Luby, Michael
Published 1996
Princeton University Press
... useful cryptographic primitives, such as private key cryptosystems, pseudorandom function generators...

9
by Ramkumar, Mahalingam
Published 2014
Springer International Publishing

10
by Gutmann, Peter
Published 2004
Springer New York
...A cryptographic security architecture is the collection of hardware and software that protects...

11
by Liu, Leibo, Wang, Bo, Wei, Shaojun
Published 2018
Springer Nature Singapore
Table of Contents: ...Introduction -- Analysis of Reconfigurability of Cryptographic Algorithms -- Hardware Architecture...

12
by Budaghyan, Lilya
Published 2014
Springer International Publishing
...This book covers novel research on construction and analysis of optimal cryptographic functions...

14
by Kayem, Anne V. D. M., Akl, Selim G., Martin, Patrick
Published 2010
Springer US
...Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so...

15 ... improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware...

16
by Ramakrishnan, Srinivasan
Published 2022
IntechOpen
...In the modern era of digitization, cryptographic techniques are becoming increasingly important...

17
Published 2019
Springer International Publishing
Table of Contents: ... of fault attacks on cryptographic hardware implementations -- Part II. Automated Design and Deployment...

18
by Shparlinski, Igor
Published 2003
Birkhäuser
Table of Contents: ... of the Diffie-Hellman Secret Key -- 14 Bit Security of the Diffie-Hellman Secret Key -- IV Other Cryptographic...