Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 715
- Data encryption (Computer science) 709
- Computer science 505
- Cryptography 418
- Data protection 418
- Computer security 372
- Security measures 331
- Artificial intelligence 223
- Computer software 218
- Coding theory 213
- Information storage and retrieval systems 205
- Data structures (Computer science) 204
- Application software 195
- Mathematics 167
- Computational complexity 140
- Information theory 126
- Computers 119
- Engineering 105
- Computer engineering 103
- Software engineering 102
- Computational intelligence 99
- Telecommunication 98
- Number theory 83
- Blockchains (Databases) 80
- Data processing 76
- Internet of things 66
- Algorithms 62
- Computer vision 61
- Operating systems (Computers) 61
- Algebra 59
-
121
Introduction to Cryptography with Maple by José Luis Gómez Pardo.
Published 2013Table of Contents: “…Preface -- Introduction -- Chap. 1 Classical Ciphers -- Chap. 2 Basic Concepts -- Chap. 3 Private-Key Encryption -- Chap. 4 Block Ciphers and Modes of Operation -- Chap. 5 Message Authentication -- Chap. 6 Algorithmic Number - Theory for Cryptography -- Chap. 7 Introduction to Public-Key Cryptography -- Chap. 8 Public-Key Encryption -- Chap. 9 Digital Signatures -- Chap. 10 Identity-Based Cryptography -- Chap. 11 Elliptic Curve Cryptography -- App. …”
Full text (Wentworth users only).
Electronic eBook -
122
-
123
Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers /...
Published 2013Table of Contents: “…Cryptanalysis -- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers -- A New Method for Solving Polynomial Systems with Noise over F2 and Its Applications in Cold Boot Key Recovery -- Cryptanalysis of the Xiao – Lai White-Box AES Implementation -- Digital Signatures A Practical Leakage-Resilient Signature Scheme in the Generic Group Model -- Forward Secure Signatures on Smart Cards -- The Stafford Tavares Lecture Extracts from the SHA-3 Competition -- Stream Ciphers Cryptanalysis of the “Kindle” Cipher -- Cryptographically Strong de Bruijn Sequences with Large Periods -- Cryptanalysis of the Loiss Stream Cipher -- Implementations -- Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three -- Efficient Implementation of Bilinear Pairings on ARM Processors -- Towards Faster and Greener Cryptoprocessor for Eta Pairing on Supersingular Elliptic Curve over F21223 -- Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers -- Block Cipher Cryptanalysis -- All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach -- Improved Cryptanalysis of the Block Cipher KASUMI -- Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers -- Attacking (EC)DSA Given Only an Implicit Hint -- Lattice Reduction for Modular Knapsack -- Hash Functions -- The Boomerang Attacks on the Round-Reduced Skein-512 -- Boomerang and Slide-Rotational Analysis of the SM3 Hash Function -- Provable Security of BLAKE with Non-ideal Compression Function -- Block Cipher Constructions TWINE: A Lightweight Block Cipher for Multiple Platforms -- Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions -- Miscellaneous -- Private Stream Search at Almost the Same Communication Cost as a Regular Search -- An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks.…”
Full text (Wentworth users only).
Electronic eBook -
124
Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings / edited by Philippe Gaborit.
Published 2013Table of Contents: “…Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures -- Quantum Algorithms for the Subset-Sum Problem -- Improved Lattice-Based Threshold Ring Signature Scheme -- Degree of Regularity for HFEv and HFEv- -- Software Speed Records for Lattice-Based Signatures -- Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search -- An Efficient Attack of a McEliece Cryptosystem Variant Based on Convolutional -- Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations -- Quantum Key Distribution in the Classical Authenticated Key Exchange Framework -- Cryptanalysis of Hash-Based Tamed Transformation and Minus Signature Scheme -- A Classification of Differential Invariants for Multivariate Post-quantum Cryptosystems -- Secure and Anonymous Hybrid Encryption from Coding Theory -- Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes -- The Hardness of Code Equivalence over Fq and Its Application to Code-Based Cryptography -- Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems -- Simple Matrix Scheme for Encryption -- Multivariate Signature Scheme Using Quadratic Forms.…”
Full text (Wentworth users only).
Electronic eBook -
125
Group-based Cryptography by Alexei Myasnikov, Alexander Ushakov, Vladimir Shpilrain.
Published 2008Table of Contents: “…Background on Groups, Complexity, and Cryptography -- 1. Background on Public Key Cryptography -- 2. …”
Full text (Wentworth users only).
Electronic eBook -
126
-
127
Timing Channels in Cryptography A Micro-Architectural Perspective / by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya.
Published 2015Table of Contents: “…An Introduction to Timing Attacks -- Modern Cryptography -- Superscalar Processors, Cache Memories, and Branch Predictors -- Time-Driven Cache Attacks -- Advanced Time-Driven Cache Attacks on Block Ciphers -- A Formal Analysis of Time-Driven Cache Attacks -- Profiled Time-Driven Cache Attacks on Block Ciphers -- Access-Driven Cache Attacks on Block Ciphers -- Branch Prediction Attacks -- Countermeasures for Timing Attacks.…”
Full text (Wentworth users only)
Electronic eBook -
128
Tutorials on the Foundations of Cryptography Dedicated to Oded Goldreich / edited by Yehuda Lindell.
Published 2017Table of Contents: “…Garbled Circuits as Randomized Encodings of Functions: A Primer -- The Complexity of Public-Key Cryptography -- Pseudorandom Functions: Three Decades Later -- The Many Entropies in One-Way Functions -- Homomorphic Encryption -- How to Simulate It: A Tutorial on the Simulation Proof Technique -- The Complexity of Differential Privacy.…”
Full text (Wentworth users only)
Electronic eBook -
129
Quantum communications and cryptography edited by Alexander V. Sergienko.
Published 2006Subjects: Full text (WIT users only)
Electronic eBook -
130
Algebraic curves in cryptography San Ling, Huaxiong Wang, Chaoping Xing.
Published 2013Table of Contents: “…Elliptic curves and their applications to cryptography -- 4. Secret sharing schemes -- 5. Authentication codes -- 6. …”
Full text (WIT users only)
Electronic eBook -
131
Handbook of applied cryptography Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone.
Published 1997Subjects: Full text (WIT users only)
Electronic eBook -
132
Group theoretic cryptography / María Isabel González Vasco, Rainer Steinwandt.
Published 2015Subjects: “…Cryptography. sh 85034453…”
Full text (WIT users only)
Electronic eBook -
133
Introduction to certificateless cryptography / Hu Xiong, Zhen Qin, and Athanasios V. Vasilakos.
Published 2017Subjects: Full text (WIT users only)
Electronic eBook -
134
History of Cryptography and Cryptanalysis Codes, Ciphers, and Their Algorithms / by John F. Dooley.
Published 2018Table of Contents: “…Introduction: A Revolutionary Cipher -- Crypto Before 1500: A Bit of Magic -- The Black Chambers: 1500 – 1776 -- Crypto Goes to War: The American Revolution -- Crypto Goes to War: The American Civil War 1861 – 1865 -- Crypto and the War to End All Wars: 1914 – 1919 -- The Interwar Period: 1919 – 1941 -- The Rise of the Machines: 1918 – 1941 -- Battle Against the Machines: World War II 1939 – 1945 -- The Machines Take Over: Computer Cryptography -- Alice and Bob and Whit and Martin: Public-Key Cryptography -- Web and Mobile Device Cryptology -- Cyber Weapons and Cyber Warfare -- Cryptology and the Internet of Things -- What is Next in Cryptology? …”
Full text (Wentworth users only)
Electronic eBook -
135
A Cryptography Primer Klein, Philip.
Published 2014Full text (Wentworth users only)
Electronic eBook -
136
Computer Security and Cryptography Konheim, Alan.
Published 2007Full text (Wentworth users only)
Electronic eBook -
137
Cryptography and Network Security Kumar, Ajay.
Published 2016Full text (Wentworth users only)
Electronic eBook -
138
Hands-On Cryptography with Java Costlow, Erik.
Published 2019Streaming video (Wentworth users only)
Electronic Video -
139
Hands-On Cryptography with Python Bowne, Samuel.
Published 2018Full text (Wentworth users only)
Electronic eBook -
140
.NET Security and Cryptography Thorsteinson, Peter.
Published 2003Full text (Wentworth users only)
Electronic eBook