To see the other types of publications on this topic, follow the link: Computational cryptography.

Books on the topic 'Computational cryptography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Computational cryptography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Lam, Kwok-Yan. Cryptography and Computational Number Theory. Birkhäuser Basel, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lam, Kwok-Yan, Igor Shparlinski, Huaxiong Wang, and Chaoping Xing, eds. Cryptography and Computational Number Theory. Birkhäuser Basel, 2001. http://dx.doi.org/10.1007/978-3-0348-8295-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

1966-, Lam Kwok Yan, and Workshop on Cryptography and Computational Number Theory (1999 : Singapore), eds. Cryptography and computational number theory. Birkhäuser Verlag, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yan, Song Y. Computational Number Theory and Modern Cryptography. John Wiley & Sons Singapore Pte. Ltd., 2012. http://dx.doi.org/10.1002/9781118188606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yan, Song Y. Computational number theory and modern cryptography. John Wiley & Sons, Inc., 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Alster, Kazimierz, Jerzy Urbanowicz, and Hugh C. Williams, eds. Public-Key Cryptography and Computational Number Theory. DE GRUYTER, 2001. http://dx.doi.org/10.1515/9783110881035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fine, Benjamin, Delaram Kahrobaei, and Gerhard Rosenberger, eds. Computational and Combinatorial Group Theory and Cryptography. American Mathematical Society, 2012. http://dx.doi.org/10.1090/conm/582.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mario, Pivk, and SpringerLink (Online service), eds. Applied Quantum Cryptography. Springer-Verlag Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rothe, Jörg. Complexity theory and cryptology: An introduction to cryptocomplexity. Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

International Conference on Public-Key Cryptography and Computational Number Theory (2000 Warsaw, Poland). Public-key cryptography and computational number theory: Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11-15, 2000. Edited by Alster Kazimierz, Urbanowicz Jerzy 1951-, Williams Hugh C, and Stefan Banach International Mathematical Center. Walter de Gruyter, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Catalano, Dario. Public Key Cryptography – PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings. International Association for Cryptologic Research, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

International Workshop on Practice and Theory in Public Key Cryptography (13th 2010 Paris, France). Public key cryptography - PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010 : proceedings. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

International Conference on Pairing-Based Cryptography (2nd 2008 Egham, England). Pairing-based cryptography - Pairing 2008: Second international conference, Egham, UK, September 1-3, 2008 ; proceedings. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Johannes, Buchmann, Manulis Mark, and SpringerLink (Online service), eds. Public Key Cryptography – PKC 2012: 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Shparlinski, Igor E. Finite Fields: Theory and Computation: The Meeting Point of Number Theory, Computer Science, Coding Theory and Cryptography. Springer Netherlands, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Iwama, Kazuo. Theory of Quantum Computation, Communication, and Cryptography: 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

International Conference on Pairing-Based Cryptography (4th 2010 Yamanaka, Japan). Pairing-based cryptography - pairing 2010: 4th international conference, Yamanaka Hot Spring, Japan, December 13-15, 2010 : proceedings. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

IWCC 2011 (2011 Qingdao, China). Coding and Cryptology: Third international workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011 : proceedings. Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Wim, Van Dam. Theory of Quantum Computation, Communication, and Cryptography: 5th Conference, TQC 2010, Leeds, UK, April 13-15, 2010, Revised Selected Papers. Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Pieprzyk, Josef. Topics in Cryptology - CT-RSA 2010: The Cryptographers’ Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings. Springer-Verlag Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

service), SpringerLink (Online, ed. Topics in Cryptology – CT-RSA 2008: The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings. Springer-Verlag Berlin Heidelberg, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

López, Javier. Applied Cryptography and Network Security: 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings. Springer-Verlag GmbH Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Schroeder, M. R. Number theory in science communication: With applications in cryptography, physics, digital information, computing, and self similarity. 2nd ed. Springer-Verlag, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Schroeder, M. R. Number theory in science and communication: With applications in cryptography, physics, digital information, computing, and self-similarity. 2nd ed. Springer-Verlag, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Schroeder, M. R. Number theory in science and communication: With applications in cryptography, physics, digital information, computing, and self-similarity. 2nd ed. Springer-Verlag, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Schroeder, M. R. Number theory in science and communication: With applications in cryptography, physics, digital information, computing, and self-similarity. 3rd ed. Springer, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Daras, Nicholas J., and Michael Th Rassias, eds. Computation, Cryptography, and Network Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18275-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Benatti, Fabio, Mark Fannes, Roberto Floreanini, and Dimitri Petritis, eds. Quantum Information, Computation and Cryptography. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11914-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Kiayias, Aggelos. Topics in Cryptology – CT-RSA 2011: The Cryptographers’ Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings. Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

CRYPTO (Conference) (30th 2010 Santa Barbara, Calif.). Advances in cryptology--CRYPTO 2010: 30th annual cryptology conference, Santa Barbara, CA, USA, August 15-19, 2010 : proceedings. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Abe, Masayuki. Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings. International Association for Cryptologic Research, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

International Conference in Cryptology in India (11th 2010 Hyderabad, India). Progress in cryptology - INDOCRYPT 2010: 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010 : proceedings. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

service), SpringerLink (Online, ed. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

International Conference Arithmetic, Geometry, Cryptography and Coding Theory (14th 2013 Marseille, France). Algorithmic arithmetic, geometry, and coding theory: 14th International Conference, Arithmetic, Geometry, Cryptography, and Coding Theory, June 3-7 2013, CIRM, Marseille, France. Edited by Ballet Stéphane 1971 editor, Perret, M. (Marc), 1963- editor, and Zaytsev, Alexey (Alexey I.), 1976- editor. American Mathematical Society, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Kawano, Yasuhito, and Michele Mosca, eds. Theory of Quantum Computation, Communication, and Cryptography. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89304-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Childs, Andrew, and Michele Mosca, eds. Theory of Quantum Computation, Communication, and Cryptography. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10698-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

van Dam, Wim, Vivien M. Kendon, and Simone Severini, eds. Theory of Quantum Computation, Communication, and Cryptography. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-18073-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Bacon, Dave, Miguel Martin-Delgado, and Martin Roetteler, eds. Theory of Quantum Computation, Communication, and Cryptography. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54429-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Iwama, Kazuo, Yasuhito Kawano, and Mio Murao, eds. Theory of Quantum Computation, Communication, and Cryptography. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35656-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Spain), EUROCRYPT (2007 Barcelona. Advances in cryptology -- EUROCRYPT 2007: 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007 ; proceedings. Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Bos, Joppe, and Martijn Stam, eds. Computational Cryptography. Cambridge University Press, 2021. http://dx.doi.org/10.1017/9781108854207.

Full text
Abstract:
The area of computational cryptography is dedicated to the development of effective methods in algorithmic number theory that improve implementation of cryptosystems or further their cryptanalysis. This book is a tribute to Arjen K. Lenstra, one of the key contributors to the field, on the occasion of his 65th birthday, covering his best-known scientific achievements in the field. Students and security engineers will appreciate this no-nonsense introduction to the hard mathematical problems used in cryptography and on which cybersecurity is built, as well as the overview of recent advances on
APA, Harvard, Vancouver, ISO, and other styles
42

Lam, Kwok Y. Cryptography and Computational Number Theory. Island Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Stam, Martijn, and Joppe Bos. Computational Cryptography: Algorithmic Aspects of Cryptology. Cambridge University Press, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Yan, Song Y. Computational Number Theory and Modern Cryptography. Wiley & Sons, Incorporated, John, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Yan, Song Y. Computational Number Theory and Modern Cryptography. Wiley & Sons, Incorporated, John, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Stam, Martijn, and Joppe Bos. Computational Cryptography: Algorithmic Aspects of Cryptology. University of Cambridge ESOL Examinations, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Yan, Song Y. Computational Number Theory and Modern Cryptography. Wiley & Sons, Incorporated, John, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Yan, Song Y. Computational Number Theory and Modern Cryptography. Wiley & Sons, Incorporated, John, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Stam, Martijn, and Joppe Bos. Computational Cryptography: Algorithmic Aspects of Cryptology. University of Cambridge ESOL Examinations, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Computational Number Theory and Modern Cryptography. Wiley & Sons, Limited, John, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!