Suggested Topics within your search.
Suggested Topics within your search.
- Data encryption (Computer science) 23
- Cryptography 16
- Security measures 15
- Computer security 13
- Computer networks 12
- Internet 5
- Computer network protocols 4
- Computer science 4
- Coding theory 3
- Data protection 3
- Computer network architectures 2
- Computer software 2
- Data structures (Computer science) 2
- Mathematics 2
- Mathematics of Computing 2
- Public key infrastructure (Computer security) 2
- Zero-knowledge proofs 2
- Access control 1
- Algorithms 1
- Computer input-output equipment 1
- Computer programming 1
- Computer science—Mathematics 1
- Data Structures and Information Theory 1
- Data Structures, Cryptology and Information Theory 1
- Database management 1
- Database security 1
- Discrete Mathematics 1
- Discrete mathematics 1
- Euclidean algorithm 1
- Hashing (Computer science) 1
-
1
The design of Rijndael : the Advanced Encryption Standard (AES) /
Published 2020“…Information security and cryptography.…”
Full Text (via Springer)
eBook -
2
Tutorials on the foundations of cryptography : dedicated to Oded Goldreich /
Published 2017“…Information security and cryptography.…”
Full Text (via Springer)
eBook -
3
The science of quantitative information flow /
Published 2020“…Information security and cryptography.…”
Full Text (via Springer)
eBook -
4
The design of Rijndael : AES--the advanced encryption standard /
Published 2002“…Information security and cryptography.…”
Book -
5
Formal correctness of security protocols /
Published 2007“…Information security and cryptography.…”
Book -
6
-
7
Modelling and verification of secure exams /
Published 2018“…Information security and cryptography.…”
Full Text (via Springer)
eBook -
8
Introduction to cryptography : principles and applications /
Published 2002“…Information security and cryptography.…”
Book -
9
Novel techniques in recovering, embedding, and enforcing policies for control-flow integrity /
Published 2021“…Information security and cryptography.…”
Full Text (via Springer)
eBook -
10
Computer security and the internet tools and jewels from malware to bitcoin /
Published 2021“…Information security and cryptography.…”
Full Text (via Springer)
Electronic eBook -
11
SCION : a secure internet architecture /
Published 2017“…Information security and cryptography.…”
Full Text (via Springer)
eBook -
12
The theory of hash functions and random oracles : an approach to modern cryptography /
Published 2021“…Information security and cryptography.…”
Full Text (via Springer)
eBook -
13
The complete guide to SCION : from design principles to formal verification /
Published 2022“…Information security and cryptography.…”
Full Text (via Springer)
eBook -
14
Cryptography made simple /
Published 2016“…Information security and cryptography.…”
Full Text (via Skillsoft)
Electronic eBook -
15
Guide to Internet cryptography : security protocols and real-world attack implications /
Published 2022“…Information security and cryptography.…”
Full Text (via Springer)
eBook -
16
Computer security and the internet tools and jewels /
Published 2020“…Information security and cryptography.…”
Full Text (via Springer)
Electronic eBook -
17
Protocols for authentication and key establishment /
Published 2020“…Information security and cryptography.…”
Full Text (via Springer)
eBook -
18
The Hash Function BLAKE /
Published 2014“…Information security and cryptography.…”
Full Text (via Springer)
eBook -
19
Secure data deletion /
Published 2016“…Information security and cryptography.…”
Full Text (via Springer)
eBook -
20
Introduction to cryptography : principles and applications /
Published 2015“…Information security and cryptography.…”
Full Text (via Springer)
eBook