1
by Martin, Keith M.
Published 2020
HighBridge Audio
Subjects: ...Cryptographie...

2
by Rubinstein-Salzedo, Simon
Published 2018
Springer International Publishing
...This text introduces cryptography, from its earliest roots to cryptosystems used today for secure...

3
by Swaine, James
Published 1761
printed for the authors, & sold by C. Henderson, J. Fuller, A. Webley ; Z. Stuart ; & S: Williams

4
by Swaine, James
Published 1765
sold by N. Young

6
Published 1983
Springer Berlin Heidelberg
Table of Contents: ...Classical Cryptography -- Cryptology - Methods and Maxims -- Mechanical Cryptographic Devices...

7
by Oriyano, Sean-Philip
Published 2013
McGraw-Hill Education
Table of Contents: ...Cryptography: Taking a Look Back and Looking Forward -- Encryption -- Visiting an Old Friend...

8
by Rana, Himanshu
Published 2020
Packt Publishing, Safari
... find out how cryptography secures the transmission of online data by using encryption methods...

9
Published 2016
Springer Berlin Heidelberg
Subjects: ...Cryptography...

10
Published 2016
Springer Berlin Heidelberg
Subjects: ...Cryptography...

11
Published 2017
Springer International Publishing
Subjects: ...Cryptography...

12
Published 2017
Springer International Publishing
Subjects: ...Cryptography...

13
Published 2017
Springer International Publishing
Table of Contents: ...Authentication -- Cryptography -- Multi-party computation -- Cryptanalysis -- Coding Theory...

14
Published 2016
Springer Berlin Heidelberg
Table of Contents: ...TCC Test-of-Time Award -- From Indifferentiability to Constructive Cryptography (and Back...

15
Published 2016
Springer Berlin Heidelberg
Table of Contents: ... Encryption: Enforcing Information Flow with Cryptography...

16
by Delfs, Hans, Knebl, Helmut
Published 2002
Springer Berlin Heidelberg
Table of Contents: ...1. Introduction -- 1.1 Encryption and Secrecy -- 1.2 The Objectives of Cryptography -- 1.3 Attacks...

17
by Delfs, Hans, Knebl, Helmut
Published 2015
Springer Berlin Heidelberg
Table of Contents: ...Introduction -- Symmetric-Key Encryption -- Public-Key Cryptography -- Cryptographic Protocols...

18
Published 2021
Springer International Publishing
Table of Contents: ... Constant-Size Assumptions -- On expected polynomial runtime in cryptography -- Information-Theoretically...

19
Published 2021
Springer International Publishing
Table of Contents: ...-Malleable Secret Sharing: Joint Tampering, Plain Model and Capacity -- Disappearing Cryptography...

20
Published 2021
Cambridge University Press
Subjects: ...Cryptography...