Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 715
- Data encryption (Computer science) 709
- Computer science 505
- Cryptography 418
- Data protection 418
- Computer security 372
- Security measures 331
- Artificial intelligence 223
- Computer software 218
- Coding theory 213
- Information storage and retrieval systems 205
- Data structures (Computer science) 204
- Application software 195
- Mathematics 167
- Computational complexity 140
- Information theory 126
- Computers 119
- Engineering 105
- Computer engineering 103
- Software engineering 102
- Computational intelligence 99
- Telecommunication 98
- Number theory 83
- Blockchains (Databases) 80
- Data processing 76
- Internet of things 66
- Algorithms 62
- Computer vision 61
- Operating systems (Computers) 61
- Algebra 59
-
141
Public-key Cryptography Theory and Practice / Das, Abhijit.
Published 2009Full text (Wentworth users only)
Electronic eBook -
142
-
143
Wireless security and cryptography : specifications and implementations / edited by Nicolas Sklavos, Xinmiao Zhang.
Published 2007Table of Contents: “…chapter 1 Overview of Cryptographic Primitives for Secure Communication -- chapter 2 Introduction to Communication Security -- chapter 3 Efficient VLSI Architectures for the Advanced Encryption Standard Algorithm -- chapter 4 Hardware Design Issues in Elliptic Curve Cryptography for Wireless Systems -- chapter 5 Efficient Elliptic Curve Cryptographic Hardware Design for Wireless Security -- chapter 6 Cryptographic Algorithms in Constrained Environments -- chapter 7 Side-Channel Analysis Attacks on Hardware Implementations of Cryptographic Algorithms -- chapter 8 Security Enhancement Layer for Bluetooth -- chapter 9 WLAN Security Processing Architectures -- chapter 10 Security Architecture and Implementation of the Universal Mobile Telecommunication System -- chapter 11 Wireless Application Protocol Security Processor: Privacy, Authentication, and Data Integrity -- chapter 12 Binary Algorithms for Multiplicative Inversion -- chapter 13 Smart Card Technology.…”
Full text (WIT users only)
Electronic eBook -
144
Broadband Quantum Cryptography Rogers, Daniel.
Published 2010Full text (Wentworth users only)
Electronic eBook -
145
Practical Cryptography in Python Learning Correct Cryptography by Example / by Seth James Nielson, Christopher K. Monson.
Published 2019Table of Contents: “…Chapter 1: Cryptography: More Than Secrecy -- Chapter 2: Hashing -- Chapter 3: Symmetric Encryption: Two Sides, One Key -- Chapter 4: Asymmetric Encryption: Public/Private Keys -- Chapter 5: Message Integrity, Signatures, and Certificates -- Chapter 6: Combining Asymmetric and Symmetric Algorithms -- Chapter 7: More Symmetric Crypto: Authenticated Encryption and Kerberos -- Chapter 8: TLS Communications -- Bibliography.-.…”
Full text (Wentworth users only)
Full text (Wentworth users only)
Electronic eBook -
146
-
147
New Frontiers in Cryptography Quantum, Blockchain, Lightweight, Chaotic and DNA / by Khaled Salah Mohamed.
Published 2020Table of Contents: “…New Trends in Cryptography: Quantum, Blockchain, Lightweight, Chaotic and DNA Cryptography -- Chapter 5. …”
Full text (Wentworth users only)
Electronic eBook -
148
Introduction to certificateless cryptography / Hu Xiong, Zhen Qin, and Athanasios V. Vasilakos.
Published 2017Subjects: Full text (WIT users only)
Electronic eBook -
149
-
150
Selected Areas in Cryptography 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers /...
Published 2021Table of Contents: “…Public-key Cryptography -- Efficient Lattice-Based Polynomial Evaluation and Batch ZK Arguments -- FROST: Flexible Round-Optimized Schnorr Threshold Signatures -- Algorithmic Acceleration of B/FV-like Somewhat Homomorphic Encryption for Compute-Enabled RAM -- Obfuscating Finite Automata -- On Index Calculus Algorithms for Subfield Curves -- Symmetric-Key Analysis Weak-Key Distinguishers for AES -- Algebraic Key-Recovery Attacks on Reduced-Round Xoofff -- Improved (Related-key) Differential Cryptanalysis on GIFT -- Boolean Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPath -- Boolean Ring Cryptographic Equation Solving -- Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions -- Unintended Features of APIs: Cryptanalysis of Incremental HMAC -- Quantum Cryptanalysis -- Low-gate Quantum Golden Collision Finding -- Improvements to quantum search techniques for block-ciphers, with applications to AES -- Post-Quantum Constructions -- Not enough LESS: An improved algorithm for solving Code Equivalence Problems over Fq -- Towards Post-Quantum Security for Signal’s X3DH Handshake -- Trapdoor DDH groups from pairings and isogenies -- Practical Isogeny-Based Key-exchange with Optimal Tightness -- Symmetric-Key Design -- PRINCEv2 -- Nonce-Misuse Security of the SAEF Authenticated Encryption mode -- WARP : Revisiting GFN for Lightweight 128-bit Block Cipher -- Side Channel Attacks -- Subsampling and Knowledge Distillation on Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations -- Correlation Power Analysis and Higher-order Masking Implementation of WAGE -- On the Influence of Optimizers in Deep Learning-based Side-channel Analysis -- Cryptographic Applications -- On Self-Equivalence Encodings in White-Box Implementations -- Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting -- High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions.-.…”
Full text (Wentworth users only)
Electronic eBook -
151
Cryptography and Cryptanalysis in MATLAB Creating and Programming Advanced Algorithms / by Marius Iulian Mihailescu, Stefania Loredana Nita.
Published 2021Table of Contents: “…Introduction -- 2. MATLAB Cryptography Functions -- 3. Conversions used in Cryptography -- 4. …”
Full text (Wentworth users only)
Electronic eBook -
152
Real-World Cryptography wong, david.
Published 2021Full text (Wentworth users only)
Full text (Wentworth users only)
Electronic eBook -
153
Coding theory and cryptography : the essentials / D.R. Hankerson [and others].
Published 2000Table of Contents: Full text (WIT users only)
Electronic eBook -
154
Real-world cryptography / David Wong.
Published 2021Subjects: Streaming video (Wentworth users only)
Streaming video (Wentworth users only)
Electronic Video -
155
Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 /...
Published 2022Table of Contents: “…Verifying the Signature -- Conclusion -- References -- Chapter 5: Classical Cryptography -- Caesar Cipher -- Implementation -- Cryptanalysis -- Vigen?…”
Full text (Wentworth users only)
Electronic eBook -
156
Cryptography for Secure Encryption by Robert G. Underwood.
Published 2022Table of Contents: “…1. Introduction to Cryptography -- 2. Introduction to Probability -- 3. …”
Full text (Wentworth users only)
Electronic eBook -
157
Code-Based Cryptography 9th International Workshop, CBCrypto 2021 Munich, Germany, June 21–22, 2021 Revised Selected Papers /...
Published 2022Table of Contents: “…A Rank Metric Code-Based Group Signature Scheme -- The Rank-Based Cryptography Library -- Security Analysis of a Cryptosystem based on Subspace Subcodes -- Information-Set Decoding with Hints -- A Correction to A Code-Based Blind Signature Scheme -- Performance bounds for QC-MDPC codes decoders.…”
Full text (Wentworth users only)
Electronic eBook -
158
Selected Areas in Cryptography 28th International Conference, Virtual Event, September 29 – October 1, 2021, Revised Selected Papers /...
Published 2022Subjects: Full text (Wentworth users only)
Electronic eBook -
159
Cryptography and Cryptanalysis in Java Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10 /...
Published 2022Table of Contents: “…Road and Vision for Jakarta EE 10 -- 4. Java Cryptography Architecture -- 5. Classical Cryptography -- 6. …”
Full text (Wentworth users only)
Electronic eBook -
160
Secret Key Cryptography Ciphers, from Simple to Unbreakable.
Published 2022Full text (Wentworth users only)
Electronic eBook