2
by Rubinstein-Salzedo, Simon
Published 2018
Springer International Publishing
...This text introduces cryptography, from its earliest roots to cryptosystems used today for secure...

3
by Martin, Keith M.
Published 2020
HighBridge Audio
Subjects: ...Cryptographie...

4
by Mammeri, Zoubir
Published 2024
John Wiley & Sons
Table of Contents: ...Introduction to Computer Security -- Introduction to Cryptography -- Mathematical Basics...

5
by Bernardini, Riccardo
Published 2021
IntechOpen
...Despite being 2000 years old, cryptography is still a very active field of research. New needs...

6
Published 1983
Springer Berlin Heidelberg
Table of Contents: ...Classical Cryptography -- Cryptology - Methods and Maxims -- Mechanical Cryptographic Devices...

7
by Oriyano, Sean-Philip
Published 2013
McGraw-Hill Education
Table of Contents: ...Cryptography: Taking a Look Back and Looking Forward -- Encryption -- Visiting an Old Friend...

8
by Rana, Himanshu
Published 2020
Packt Publishing, Safari
... find out how cryptography secures the transmission of online data by using encryption methods...

9
by Swaine, James
Published 1761
printed for the authors, & sold by C. Henderson, J. Fuller, A. Webley ; Z. Stuart ; & S: Williams

10
by Swaine, James
Published 1765
sold by N. Young

11
by Delfs, Hans, Knebl, Helmut
Published 2002
Springer Berlin Heidelberg
Table of Contents: ...1. Introduction -- 1.1 Encryption and Secrecy -- 1.2 The Objectives of Cryptography -- 1.3 Attacks...

12
Published 2016
Springer Berlin Heidelberg
Table of Contents: ...TCC Test-of-Time Award -- From Indifferentiability to Constructive Cryptography (and Back...

13
Published 2016
Springer Berlin Heidelberg
Table of Contents: ... Encryption: Enforcing Information Flow with Cryptography...

14
Published 2017
Springer International Publishing
Subjects: ...Cryptography...

15
Published 2017
Springer International Publishing
Subjects: ...Cryptography...

16
Published 2017
Springer International Publishing
Table of Contents: ...Authentication -- Cryptography -- Multi-party computation -- Cryptanalysis -- Coding Theory...

17
Published 2018
Springer International Publishing
Table of Contents: ... -- Information-theoretic cryptography -- Trapdoor permutations and signatures -- Coin-tossing and fairness...

18
Published 2018
Springer International Publishing
Table of Contents: ... cryptography II and quantum cryptography -- LWE-based cryptography -- iO and authentication -- ORAM and PRF....

19
by Talbot, J., Welsh, D. J. A.
Published 2006
Cambridge University Press
Subjects: ...Cryptography...

20
by Omondi, Amos R.
Published 2020
Springer International Publishing
Subjects: ...Cryptography...