To see the other types of publications on this topic, follow the link: Block cipher.

Books on the topic 'Block cipher'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Block cipher.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Knudsen, Lars R., and Matthew J. B. Robshaw. The Block Cipher Companion. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-17342-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Knudsen, Lars. The Block Cipher Companion. Springer-Verlag Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

1963-, Schneier Bruce, ed. The twofish encryption algorithm: A 128-bit block cipher. J. Wiley, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

National Institute of Standards and Technology (U.S.), ed. Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Standardization, International Organization for. Information technology: Modes of operation for an n-bit block cipher algorithm. ISO, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dworkin, Morris. Recommendation for block cipher modes of operation: Galois/Counter mode (GCM) and GMAC. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sakiyama, Kazuo, Yu Sasaki, and Yang Li. Security of Block Ciphers. John Wiley & Sons, Singapore Pte. Ltd, 2015. http://dx.doi.org/10.1002/9781118660027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Institution, British Standards. British Standard guide to modes of operation for a 64-bit block cipher algorithm =: Guide des modes opératoires d'un algorithme de chiffrement par blocs de 64 bits = Leitfaden für Betriebsarten für einen 64-Bit-Blockschlüsselalgorithmus. BSI, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Harpes, Carlo. Cryptanalysis of iterated block ciphers. Hartung-Gorre, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Moliner, Richard J. De. On the statistical testing of block ciphers. Hartung-Gorre, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Moldovyan, Nick. Data-driven block ciphers for fast telecommunication systems. Auerbach Publications, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Lai, Xuejia. On the design and security of block ciphers. Hartung-Gorre Verlag, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Khairallah, Mustafa. Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-6344-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Sakiyama, Kazuo. Security of block ciphers: From algorithm design to hardware implementation. John Wiley & Sons Inc., 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Carman, Patrick. The Black Circle: Library Edition. Scholastic Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Myers, Steven Andrew. On the development of block-ciphers and pseudo-random function generators using the composition and XOR operators. National Library of Canada, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

King, Stephen. El umbral de la noche. Plaza y Janés, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

King, Stephen. Night Shift. Knopf Doubleday Publishing Group, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

King, Stephen. Night shift. G.K. Hall, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

King, Stephen. Night shift. Anchor Books, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

King, Stephen. Night Shift. New American Library, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

King, Stephen. Night Shift. New English Library, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

King, Stephen. Night Shift. Anchor Books, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

King, Stephen. Night shift. ISIS Large Print, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

King, Stephen. Night Shift. New American Library, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

King, Stephen. The Shining / 'Salem's Lot / Night Shift / Carrie. 5th ed. Octopus/Heinemann, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Robshaw, Matthew, and Lars R. Knudsen. The Block Cipher Companion. Springer, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Martin, Keith M. Symmetric Encryption. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0004.

Full text
Abstract:
In this chapter, we focus on symmetric encryption. We begin by identifying two different types of symmetric encryption algorithm, namely, stream and block ciphers. We discuss the basic idea behind a stream cipher and consider their properties and applications. We then introduce block ciphers. We focus on two extremely important and influential block cipher algorithms, the Data Encryption Standard and the Advanced Encryption Standard, discussing the history of their development as well as their basic design. We then introduce the modes of operation of a block cipher, explaining why different mo
APA, Harvard, Vancouver, ISO, and other styles
29

Ferguson, Niels, Chris Hall, John Kelsey, David Wagner, Doug Whiting, and Bruce Schneier. The Twofish Encryption Algorithm: A 128-Bit Block Cipher. Wiley, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Harrison, Payne. Black Cipher. Random House Value Publishing, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Black cipher. Crown Publishers, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Junod, Pascal. Block Ciphers. Taylor & Francis Group, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Hughey, Lisa. Blowback: Black Cipher Files #1. Hughey, Lisa, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Hughey, Lisa. Burned: Black Cipher Files #3. Hughey, Lisa, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Hughey, Lisa. Betrayals: Black Cipher Files #2. Hughey, Lisa, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Harpes, Carlo. Cryptanalysis of iterated block ciphers. 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Hughey, Lisa. Dangerous Game: Black Cipher Files #4. Hughey, Lisa, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Sessions, Julian Brently. Fast software implementations of block ciphers. 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Dunkelman, Orr, and Eli Biham. Techniques for Cryptanalysis of Block Ciphers. Springer, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Moliner, Richard J. de. On the statistical testing of block ciphers. 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Junod, P., and A. Canteaut. Advanced Linear Cryptanalysis of Block and Stream Ciphers. IOS Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Richard Erwin Alexander.* Cleve. Methodologies for designing block ciphers and cryptographic protocols. 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Data-driven Block Ciphers for Fast Telecommunication Systems. AUERBACH, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Moldovyan, Nikolai, and Alexander A. Moldovyan. Data-Driven Block Ciphers for Fast Telecommunication Systems. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Moldovyan, Nikolai, and Alexander A. Moldovyan. Data-Driven Block Ciphers for Fast Telecommunication Systems. Taylor & Francis Group, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Moldovyan, Nikolai, and Alexander A. Moldovyan. Data-Driven Block Ciphers for Fast Telecommunication Systems. Auerbach Publishers, Incorporated, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Canteaut, A., and P. Junod. Advanced Linear Cryptanalysis of Block and Stream Ciphers. IOS Press, Incorporated, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Zürich, Eidgenössische Technische Hochschule, ed. On the design and security of block ciphers. 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Khairallah, Mustafa. Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers. Springer, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Khairallah, Mustafa. Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers. Springer Singapore Pte. Limited, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!