To see the other types of publications on this topic, follow the link: Cryptography – Research.

Books on the topic 'Cryptography – Research'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 18 books for your research on the topic 'Cryptography – Research.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Symposium on State and Progress of Research in Cryptography (3rd 1993 Rome, Italy). Proceedings of the 3rd Symposium on State and Progress of Research in Cryptography: Rome, Italy, February 15-16, 1993 : SPRC '93. Fondazione Ugo Bordoni, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Boolean functions in coding theory and cryptography. American Mathematical Society, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dam, Kenneth W. The role of private groups in public policy: Cryptography and the National Research Council. Law School, the University of Chicago, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Western, European Workshop on Research in Cryptology (2007 :. Bochum Germany). Research in cryptology: Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, revised selected papers. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stefan, Lucks, Sadeghi Ahmad-Reza, and Wolf Christopher, eds. Research in cryptology: Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, revised selected papers. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Western European Workshop on Research in Cryptology (2007 : Bochum, Germany). Research in cryptology: Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, revised selected papers. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sexton, Donal J. Signals intelligence in World War II: A research guide. Greenwood Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Linear A and Cypro-Minoan in the light of heuristics and cryptology: A research report. B.Z. Szałek, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Forschung, Rüstung und Krieg: Formen, Ausmass und Grenzen des Wissenschaftlereinsatzes für den Zweiten Weltkrieg im Deutschen Reich. Books on Demand, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

1951-, Chadwick David, Zhao Gansen, and LINK (Online service), eds. Public key infrastructure: Second European PKI Workshop : Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005 : proceedings. Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Lahyane, Mustapha. Algbra for secure and reliable communication modeling: CIMPA Research School and Conference Algebra for Secure and Reliable Communication Modeling, October 1-13, 2012, Morelia, State of Michoaczn, Mexico. Edited by Martínez-Moro Edgar editor. American Mathematical Society, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Alta.) WIN (Conference) (2nd 2011 Banff. Women in Numbers 2: Research directions in number theory : BIRS Workshop, WIN2 - Women in Numbers 2, November 6-11, 2011, Banff International Research Station, Banff, Alberta, Canada. Edited by David Chantal 1964-, Lalín Matilde 1977-, and Manes Michelle 1970-. American Mathematical Society, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

E, Chen Roland, ed. Cryptography research perspectives. Nova Science Publishers, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Martin, Keith. Everyday Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.001.0001.

Full text
Abstract:
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient technologies and overwhelming theoretical research. The first part of the book provides essential background, identifying the core security services provided by cryptography. The next part introduces the main cryptographic mechanisms that deliver these security services such as encryption, hash functions, and digital signatures, discussing why they work and how to deploy them, without delving into any significant mathematical detail. In the third part, the important practical aspects of key management are introduced, which is essential for making cryptography work in real systems. The last part considers the application of cryptography. A range of application case studies is presented, alongside a discussion of the wider societal issues arising from use of cryptography to support contemporary cyber security.
APA, Harvard, Vancouver, ISO, and other styles
15

Buhler, J. P. Algorithmic Number Theory: Lattices, Number Fields, Curves and Cryptography (Mathematical Sciences Research Institute Publications). Cambridge University Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Wengui, Ceng, Guan Dazhi, and Ke ji zheng ce yan jiu yu zi xun zhong xin., eds. Zui xin mi ma xue yan jiu fa zhan xian kuang: Current status in cryptology research and development. Cai tuan fa ren Guo jia shi yan yan jiu yuan ke ji zheng ce yan jiu yu zi xue zhong xin, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Bolfing, Andreas. Cryptographic Primitives in Blockchain Technology. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198862840.001.0001.

Full text
Abstract:
Many online applications, especially in the financial industries, are running on blockchain technologies in a decentralized manner, without the use of an authoritative entity or a trusted third party. Such systems are only secured by cryptographic protocols and a consensus mechanism. As blockchain-based solutions will continue to revolutionize online applications in a growing digital market in the future, one needs to identify the principal opportunities and potential risks. Hence, it is unavoidable to learn the mathematical and cryptographic procedures behind blockchain technology in order to understand how such systems work and where the weak points are. The book provides an introduction to the mathematical and cryptographic concepts behind blockchain technologies and shows how they are applied in blockchain-based systems. This includes an introduction to the general blockchain technology approaches that are used to build the so-called immutable ledgers, which are based on cryptographic signature schemes. As future quantum computers will break some of the current cryptographic primitive approaches, the book considers their security and presents the current research results that estimate the impact on blockchain-based systems if some of the cryptographic primitive break. Based on the example of Bitcoin, it shows that weak cryptographic primitives pose a possible danger for the ledger, which can be overcome through the use of the so-called post-quantum cryptographic approaches which are introduced as well.
APA, Harvard, Vancouver, ISO, and other styles
18

Parkin, Jack. Money Code Space. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780197515075.001.0001.

Full text
Abstract:
Newly emerging cryptocurrencies and blockchain technology present a challenging research problem in the field of digital politics and economics. Bitcoin—the first widely implemented cryptocurrency and blockchain architecture—seemingly separates itself from the existing territorial boundedness of nation-state money via a process of algorithmic decentralisation. Proponents declare that the utilisation of cryptography to advance financial transactions will disrupt the modern centralised structures by which capitalist economies are currently organised: corporations, governments, commercial banks, and central banks. Allegedly, software can create a more stable and democratic global economy; a world free from hierarchy and control. In Money Code Space, Jack Parkin debunks these utopian claims by approaching distributed ledger technologies as a spatial and social problem where power forms unevenly across their networks. First-hand accounts of online communities, open-source software governance, infrastructural hardware operations, and Silicon Valley start-up culture are used to ground understandings of cryptocurrencies in the “real world.” Consequently, Parkin demonstrates how Bitcoin and other blockchains are produced across a multitude of tessellated spaces from which certain stakeholders exercise considerable amounts of power over their networks. While money, code, and space are certainly transformed by distributed ledgers, algorithmic decentralisation is rendered inherently paradoxical because it is predicated upon centralised actors, practices, and forces.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!