Showing 121 - 140 results of 2,486 for search '"cryptography"', query time: 0.08s Refine Results
  1. 121

    Introduction to Cryptography with Maple by José Luis Gómez Pardo. by Gómez Pardo, José Luis

    Published 2013
    Table of Contents: “…Preface -- Introduction -- Chap. 1 Classical Ciphers -- Chap. 2 Basic Concepts -- Chap. 3 Private-Key Encryption -- Chap. 4 Block Ciphers and Modes of Operation -- Chap. 5 Message Authentication -- Chap. 6 Algorithmic Number - Theory for Cryptography -- Chap. 7 Introduction to Public-Key Cryptography -- Chap. 8 Public-Key Encryption -- Chap. 9 Digital Signatures -- Chap. 10 Identity-Based Cryptography -- Chap. 11 Elliptic Curve Cryptography -- App. …”
    Full text (Wentworth users only).
    Electronic eBook
  2. 122
  3. 123

    Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers /... by Knudsen, Lars R.

    Published 2013
    Table of Contents: “…Cryptanalysis -- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers -- A New Method for Solving Polynomial Systems with Noise over F2 and Its Applications in Cold Boot Key Recovery -- Cryptanalysis of the Xiao – Lai White-Box AES Implementation -- Digital Signatures A Practical Leakage-Resilient Signature Scheme in the Generic Group Model -- Forward Secure Signatures on Smart Cards -- The Stafford Tavares Lecture Extracts from the SHA-3 Competition -- Stream Ciphers Cryptanalysis of the “Kindle” Cipher -- Cryptographically Strong de Bruijn Sequences with Large Periods -- Cryptanalysis of the Loiss Stream Cipher -- Implementations -- Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three -- Efficient Implementation of Bilinear Pairings on ARM Processors -- Towards Faster and Greener Cryptoprocessor for Eta Pairing on Supersingular Elliptic Curve over F21223 -- Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers -- Block Cipher Cryptanalysis -- All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach -- Improved Cryptanalysis of the Block Cipher KASUMI -- Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers -- Attacking (EC)DSA Given Only an Implicit Hint -- Lattice Reduction for Modular Knapsack -- Hash Functions -- The Boomerang Attacks on the Round-Reduced Skein-512 -- Boomerang and Slide-Rotational Analysis of the SM3 Hash Function -- Provable Security of BLAKE with Non-ideal Compression Function -- Block Cipher Constructions TWINE: A Lightweight Block Cipher for Multiple Platforms -- Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions -- Miscellaneous -- Private Stream Search at Almost the Same Communication Cost as a Regular Search -- An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks.…”
    Full text (Wentworth users only).
    Electronic eBook
  4. 124

    Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings / edited by Philippe Gaborit. by Gaborit, Philippe

    Published 2013
    Table of Contents: “…Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures -- Quantum Algorithms for the Subset-Sum Problem -- Improved Lattice-Based Threshold Ring Signature Scheme -- Degree of Regularity for HFEv and HFEv- -- Software Speed Records for Lattice-Based Signatures -- Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search -- An Efficient Attack of a McEliece Cryptosystem Variant Based on Convolutional -- Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations -- Quantum Key Distribution in the Classical Authenticated Key Exchange Framework -- Cryptanalysis of Hash-Based Tamed Transformation and Minus Signature Scheme -- A Classification of Differential Invariants for Multivariate Post-quantum Cryptosystems -- Secure and Anonymous Hybrid Encryption from Coding Theory -- Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes -- The Hardness of Code Equivalence over Fq and Its Application to Code-Based Cryptography -- Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems -- Simple Matrix Scheme for Encryption -- Multivariate Signature Scheme Using Quadratic Forms.…”
    Full text (Wentworth users only).
    Electronic eBook
  5. 125

    Group-based Cryptography by Alexei Myasnikov, Alexander Ushakov, Vladimir Shpilrain. by Myasnikov, Alexei

    Published 2008
    Table of Contents: “…Background on Groups, Complexity, and Cryptography -- 1. Background on Public Key Cryptography -- 2. …”
    Full text (Wentworth users only).
    Electronic eBook
  6. 126
  7. 127

    Timing Channels in Cryptography A Micro-Architectural Perspective / by Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya. by Rebeiro, Chester, Mukhopadhyay, Debdeep, Bhattacharya, Sarani

    Published 2015
    Table of Contents: “…An Introduction to Timing Attacks -- Modern Cryptography -- Superscalar Processors, Cache Memories, and Branch Predictors -- Time-Driven Cache Attacks -- Advanced Time-Driven Cache Attacks on Block Ciphers -- A Formal Analysis of Time-Driven Cache Attacks -- Profiled Time-Driven Cache Attacks on Block Ciphers -- Access-Driven Cache Attacks on Block Ciphers -- Branch Prediction Attacks -- Countermeasures for Timing Attacks.…”
    Full text (Wentworth users only)
    Electronic eBook
  8. 128

    Tutorials on the Foundations of Cryptography Dedicated to Oded Goldreich / edited by Yehuda Lindell.

    Published 2017
    Table of Contents: “…Garbled Circuits as Randomized Encodings of Functions: A Primer -- The Complexity of Public-Key Cryptography -- Pseudorandom Functions: Three Decades Later -- The Many Entropies in One-Way Functions -- Homomorphic Encryption -- How to Simulate It: A Tutorial on the Simulation Proof Technique -- The Complexity of Differential Privacy.…”
    Full text (Wentworth users only)
    Electronic eBook
  9. 129

    Quantum communications and cryptography edited by Alexander V. Sergienko.

    Published 2006
    Subjects:
    Full text (WIT users only)
    Electronic eBook
  10. 130

    Algebraic curves in cryptography San Ling, Huaxiong Wang, Chaoping Xing. by Ling, San, 1964-

    Published 2013
    Table of Contents: “…Elliptic curves and their applications to cryptography -- 4. Secret sharing schemes -- 5. Authentication codes -- 6. …”
    Full text (WIT users only)
    Electronic eBook
  11. 131
  12. 132

    Group theoretic cryptography / María Isabel González Vasco, Rainer Steinwandt. by González Vasco, María Isabel, Steinwandt, Rainer

    Published 2015
    Subjects: “…Cryptography. sh 85034453…”
    Full text (WIT users only)
    Electronic eBook
  13. 133
  14. 134

    History of Cryptography and Cryptanalysis Codes, Ciphers, and Their Algorithms / by John F. Dooley. by Dooley, John F.

    Published 2018
    Table of Contents: “…Introduction: A Revolutionary Cipher -- Crypto Before 1500: A Bit of Magic -- The Black Chambers: 1500 – 1776 -- Crypto Goes to War: The American Revolution -- Crypto Goes to War: The American Civil War 1861 – 1865 -- Crypto and the War to End All Wars: 1914 – 1919 -- The Interwar Period: 1919 – 1941 -- The Rise of the Machines: 1918 – 1941 -- Battle Against the Machines: World War II 1939 – 1945 -- The Machines Take Over: Computer Cryptography -- Alice and Bob and Whit and Martin: Public-Key Cryptography -- Web and Mobile Device Cryptology -- Cyber Weapons and Cyber Warfare -- Cryptology and the Internet of Things -- What is Next in Cryptology? …”
    Full text (Wentworth users only)
    Electronic eBook
  15. 135

    A Cryptography Primer Klein, Philip. by Klein, Philip

    Published 2014
    Full text (Wentworth users only)
    Electronic eBook
  16. 136

    Computer Security and Cryptography Konheim, Alan. by Konheim, Alan

    Published 2007
    Full text (Wentworth users only)
    Electronic eBook
  17. 137

    Cryptography and Network Security Kumar, Ajay. by Kumar, Ajay, Bose, S.

    Published 2016
    Full text (Wentworth users only)
    Electronic eBook
  18. 138

    Hands-On Cryptography with Java Costlow, Erik. by Costlow, Erik

    Published 2019
    Streaming video (Wentworth users only)
    Electronic Video
  19. 139

    Hands-On Cryptography with Python Bowne, Samuel. by Bowne, Samuel

    Published 2018
    Full text (Wentworth users only)
    Electronic eBook
  20. 140

    .NET Security and Cryptography Thorsteinson, Peter. by Thorsteinson, Peter, Ganesh, G.

    Published 2003
    Full text (Wentworth users only)
    Electronic eBook