Books on the topic 'Computational cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Computational cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Lam, Kwok-Yan. Cryptography and Computational Number Theory. Birkhäuser Basel, 2001.
Find full textLam, Kwok-Yan, Igor Shparlinski, Huaxiong Wang, and Chaoping Xing, eds. Cryptography and Computational Number Theory. Birkhäuser Basel, 2001. http://dx.doi.org/10.1007/978-3-0348-8295-8.
Full text1966-, Lam Kwok Yan, and Workshop on Cryptography and Computational Number Theory (1999 : Singapore), eds. Cryptography and computational number theory. Birkhäuser Verlag, 2001.
Find full textYan, Song Y. Computational Number Theory and Modern Cryptography. John Wiley & Sons Singapore Pte. Ltd., 2012. http://dx.doi.org/10.1002/9781118188606.
Full textYan, Song Y. Computational number theory and modern cryptography. John Wiley & Sons, Inc., 2013.
Find full textAlster, Kazimierz, Jerzy Urbanowicz, and Hugh C. Williams, eds. Public-Key Cryptography and Computational Number Theory. DE GRUYTER, 2001. http://dx.doi.org/10.1515/9783110881035.
Full textFine, Benjamin, Delaram Kahrobaei, and Gerhard Rosenberger, eds. Computational and Combinatorial Group Theory and Cryptography. American Mathematical Society, 2012. http://dx.doi.org/10.1090/conm/582.
Full textMario, Pivk, and SpringerLink (Online service), eds. Applied Quantum Cryptography. Springer-Verlag Berlin Heidelberg, 2010.
Find full textRothe, Jörg. Complexity theory and cryptology: An introduction to cryptocomplexity. Springer, 2005.
Find full textInternational Conference on Public-Key Cryptography and Computational Number Theory (2000 Warsaw, Poland). Public-key cryptography and computational number theory: Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11-15, 2000. Edited by Alster Kazimierz, Urbanowicz Jerzy 1951-, Williams Hugh C, and Stefan Banach International Mathematical Center. Walter de Gruyter, 2001.
Find full textCatalano, Dario. Public Key Cryptography – PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings. International Association for Cryptologic Research, 2011.
Find full textInternational Workshop on Practice and Theory in Public Key Cryptography (13th 2010 Paris, France). Public key cryptography - PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010 : proceedings. Springer, 2010.
Find full textInternational Conference on Pairing-Based Cryptography (2nd 2008 Egham, England). Pairing-based cryptography - Pairing 2008: Second international conference, Egham, UK, September 1-3, 2008 ; proceedings. Springer, 2008.
Find full textJohannes, Buchmann, Manulis Mark, and SpringerLink (Online service), eds. Public Key Cryptography – PKC 2012: 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textShparlinski, Igor E. Finite Fields: Theory and Computation: The Meeting Point of Number Theory, Computer Science, Coding Theory and Cryptography. Springer Netherlands, 1999.
Find full textIwama, Kazuo. Theory of Quantum Computation, Communication, and Cryptography: 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2013.
Find full textInternational Conference on Pairing-Based Cryptography (4th 2010 Yamanaka, Japan). Pairing-based cryptography - pairing 2010: 4th international conference, Yamanaka Hot Spring, Japan, December 13-15, 2010 : proceedings. Springer, 2010.
Find full textIWCC 2011 (2011 Qingdao, China). Coding and Cryptology: Third international workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011 : proceedings. Springer, 2011.
Find full textWim, Van Dam. Theory of Quantum Computation, Communication, and Cryptography: 5th Conference, TQC 2010, Leeds, UK, April 13-15, 2010, Revised Selected Papers. Springer Berlin Heidelberg, 2011.
Find full textPieprzyk, Josef. Topics in Cryptology - CT-RSA 2010: The Cryptographers’ Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings. Springer-Verlag Berlin Heidelberg, 2010.
Find full textservice), SpringerLink (Online, ed. Topics in Cryptology – CT-RSA 2008: The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings. Springer-Verlag Berlin Heidelberg, 2008.
Find full textLópez, Javier. Applied Cryptography and Network Security: 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings. Springer-Verlag GmbH Berlin Heidelberg, 2011.
Find full textSchroeder, M. R. Number theory in science communication: With applications in cryptography, physics, digital information, computing, and self similarity. 2nd ed. Springer-Verlag, 1986.
Find full textSchroeder, M. R. Number theory in science and communication: With applications in cryptography, physics, digital information, computing, and self-similarity. 2nd ed. Springer-Verlag, 1990.
Find full textSchroeder, M. R. Number theory in science and communication: With applications in cryptography, physics, digital information, computing, and self-similarity. 2nd ed. Springer-Verlag, 1986.
Find full textSchroeder, M. R. Number theory in science and communication: With applications in cryptography, physics, digital information, computing, and self-similarity. 3rd ed. Springer, 1997.
Find full textDaras, Nicholas J., and Michael Th Rassias, eds. Computation, Cryptography, and Network Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18275-9.
Full textBenatti, Fabio, Mark Fannes, Roberto Floreanini, and Dimitri Petritis, eds. Quantum Information, Computation and Cryptography. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11914-9.
Full textKiayias, Aggelos. Topics in Cryptology – CT-RSA 2011: The Cryptographers’ Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings. Springer Berlin Heidelberg, 2011.
Find full textCRYPTO (Conference) (30th 2010 Santa Barbara, Calif.). Advances in cryptology--CRYPTO 2010: 30th annual cryptology conference, Santa Barbara, CA, USA, August 15-19, 2010 : proceedings. Springer, 2010.
Find full textAbe, Masayuki. Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings. International Association for Cryptologic Research, 2010.
Find full textInternational Conference in Cryptology in India (11th 2010 Hyderabad, India). Progress in cryptology - INDOCRYPT 2010: 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010 : proceedings. Springer, 2010.
Find full textservice), SpringerLink (Online, ed. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday. Springer Berlin Heidelberg, 2012.
Find full textInternational Conference Arithmetic, Geometry, Cryptography and Coding Theory (14th 2013 Marseille, France). Algorithmic arithmetic, geometry, and coding theory: 14th International Conference, Arithmetic, Geometry, Cryptography, and Coding Theory, June 3-7 2013, CIRM, Marseille, France. Edited by Ballet Stéphane 1971 editor, Perret, M. (Marc), 1963- editor, and Zaytsev, Alexey (Alexey I.), 1976- editor. American Mathematical Society, 2015.
Find full textKawano, Yasuhito, and Michele Mosca, eds. Theory of Quantum Computation, Communication, and Cryptography. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89304-2.
Full textChilds, Andrew, and Michele Mosca, eds. Theory of Quantum Computation, Communication, and Cryptography. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10698-9.
Full textvan Dam, Wim, Vivien M. Kendon, and Simone Severini, eds. Theory of Quantum Computation, Communication, and Cryptography. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-18073-6.
Full textBacon, Dave, Miguel Martin-Delgado, and Martin Roetteler, eds. Theory of Quantum Computation, Communication, and Cryptography. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54429-3.
Full textIwama, Kazuo, Yasuhito Kawano, and Mio Murao, eds. Theory of Quantum Computation, Communication, and Cryptography. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35656-8.
Full textSpain), EUROCRYPT (2007 Barcelona. Advances in cryptology -- EUROCRYPT 2007: 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007 ; proceedings. Springer, 2007.
Find full textBos, Joppe, and Martijn Stam, eds. Computational Cryptography. Cambridge University Press, 2021. http://dx.doi.org/10.1017/9781108854207.
Full textStam, Martijn, and Joppe Bos. Computational Cryptography: Algorithmic Aspects of Cryptology. Cambridge University Press, 2021.
Find full textYan, Song Y. Computational Number Theory and Modern Cryptography. Wiley & Sons, Incorporated, John, 2012.
Find full textYan, Song Y. Computational Number Theory and Modern Cryptography. Wiley & Sons, Incorporated, John, 2012.
Find full textStam, Martijn, and Joppe Bos. Computational Cryptography: Algorithmic Aspects of Cryptology. University of Cambridge ESOL Examinations, 2021.
Find full textYan, Song Y. Computational Number Theory and Modern Cryptography. Wiley & Sons, Incorporated, John, 2012.
Find full textYan, Song Y. Computational Number Theory and Modern Cryptography. Wiley & Sons, Incorporated, John, 2012.
Find full textStam, Martijn, and Joppe Bos. Computational Cryptography: Algorithmic Aspects of Cryptology. University of Cambridge ESOL Examinations, 2021.
Find full textComputational Number Theory and Modern Cryptography. Wiley & Sons, Limited, John, 2012.
Find full text