Search alternatives:
"cryptographer" » "cryptographers", "cryptography", "cryptographic"

1
by Horváth, Máté, Buttyán, Levente
Published 2020
Springer International Publishing
...This book explains the development of cryptographic obfuscation, providing insight into the most...

2
by Coyne, Richard
Published 2023
The MIT Press

3
by Rosenheim, Shawn James
Published 2020
Johns Hopkins University Press
..., but, through his effect on real cryptographers, Poe's writing influenced the outcome of World War II...

4
by Cook, Debra, Keromytis, Angelos D.
Published 2006
Springer US
Table of Contents: ...Graphical Processing Units -- Motivation -- Encryption in GPUs -- Remotely Keyed Cryptographics...

5
Published 2009
Springer US
Table of Contents: ...About Cryptographic Engineering -- Random Number Generators for Cryptographic Applications...

6
by Dong, Ling, Chen, Kefei
Published 2012
Springer Berlin Heidelberg
Table of Contents: ...Introduction of Cryptographic Protocol -- Informal Analysis -- Informal Analysis of Cryptographic...

7
by Ramkumar, Mahalingam
Published 2014
Springer International Publishing

8
by Miller, Dr. A. Ray
Published 2006
Center for Cryptologic History, NSA
...The brochure derives for the first time the exact number of theoretical cryptographic key settings...

9
by Luby, Michael
Published 1996
Princeton University Press
... useful cryptographic primitives, such as private key cryptosystems, pseudorandom function generators...

10
by Liu, Leibo, Wang, Bo, Wei, Shaojun
Published 2018
Springer Nature Singapore
Table of Contents: ...Introduction -- Analysis of Reconfigurability of Cryptographic Algorithms -- Hardware Architecture...

11
by Gutmann, Peter
Published 2004
Springer New York
...A cryptographic security architecture is the collection of hardware and software that protects...

12
by Budaghyan, Lilya
Published 2014
Springer International Publishing
...This book covers novel research on construction and analysis of optimal cryptographic functions...

14
by Kayem, Anne V. D. M., Akl, Selim G., Martin, Patrick
Published 2010
Springer US
...Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so...

15
Published 1999
Springer Berlin Heidelberg
Table of Contents: ... for Cryptographic Applications -- Random Number Generators Founded on Signal and Information Theory -- Cryptographic...

16 ... improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware...

17
Published 2019
Springer International Publishing
Table of Contents: ... of fault attacks on cryptographic hardware implementations -- Part II. Automated Design and Deployment...

18
by Ramakrishnan, Srinivasan
Published 2022
IntechOpen
...In the modern era of digitization, cryptographic techniques are becoming increasingly important...

19
by Shparlinski, Igor
Published 2003
Birkhäuser
Table of Contents: ... of the Diffie-Hellman Secret Key -- 14 Bit Security of the Diffie-Hellman Secret Key -- IV Other Cryptographic...

20
Published 2016
Springer Berlin Heidelberg
...This book constitutes the proceedings of the 18th International Conference on Cryptographic...