To see the other types of publications on this topic, follow the link: Cryptosystem.

Books on the topic 'Cryptosystem'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 48 books for your research on the topic 'Cryptosystem.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

K, Kokula Krishna Hari, ed. MIMO Wireless based Cryptosystem using Electronic Key Generation Unit. Chennai, India: Association of Scientists, Developers and Faculties, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Jiang, and Zhenfeng Zhang. Lattice-Based Cryptosystems. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8427-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ding, Jintai, Albrecht Petzoldt, and Dieter S. Schmidt. Multivariate Public Key Cryptosystems. New York, NY: Springer US, 2020. http://dx.doi.org/10.1007/978-1-0716-0987-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Menezes, A. J. Elliptic curve public key cryptosystems. Boston: Kluwer Academic Publishers, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Menezes, Alfred. Elliptic Curve Public Key Cryptosystems. Boston, MA: Springer US, 1993. http://dx.doi.org/10.1007/978-1-4615-3198-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Menezes, Alfred. Elliptic Curve Public Key Cryptosystems. Boston, MA: Springer US, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yan, Song Y. Quantum Attacks on Public-Key Cryptosystems. Boston, MA: Springer US, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yan, Song Y. Quantum Attacks on Public-Key Cryptosystems. Boston, MA: Springer US, 2013. http://dx.doi.org/10.1007/978-1-4419-7722-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

1967-, Naccache David, and Paillier Pascal, eds. Public key cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 : proceedings. Berlin: Springer, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

1943-, Imai Hideki, and Zheng Yuliang 1962-, eds. Public key cryptography: Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000 : proceedings. Berlin: Springer, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

International, Workshop on Practice and Theory in Public Key Cryptography (5th 2002 Paris France). Public key cryptography: 4th [i.e. 5th] International Workshop on Practice and Theory in Public Key Cryptosystems [i.e. Cryptography], PKC 2002, Paris, France, February 12-14, 2002 : proceedings. Berlin: Springer, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kwangjo, Kim, ed. Public key cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001 Cheju Island, Korea, February 13-15, 2001 : proceedings /c Kwangjo Kim (ed.). New York: Springer, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Martin, Keith M. Theoretical versus Practical Security. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0003.

Full text
Abstract:
In this chapter, we consider the relationship between theoretical and practical security of a cryptosystem. The concept of perfect secrecy is introduced, and the one-time pad is exhibited as a cryptosystem having this property. We explain why the one-time pad offers the best possible theoretical security that any cryptosystem can have. We then identify reasons why the one-time pad may well be insecure when adopted in practice. The compromises real cryptosystems adopt for reasons of practicality are investigated with the intention of working towards a notion of practical security of a cryptosystem.
APA, Harvard, Vancouver, ISO, and other styles
14

Martin, Keith M. Historical Cryptosystems. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0002.

Full text
Abstract:
This chapter presents several historical cryptosystems. These are all relatively simple, and none are fit for modern use. These cryptosystems serve to illustrate the basic model of a cryptosystem, as well as introduce a number of important design principles for modern encryption algorithms. We demonstrate the importance of a large keyspace, randomness of ciphertext, and positional dependence. We also show how efficiency and security are often traded off against one another when designing a cryptosystem.
APA, Harvard, Vancouver, ISO, and other styles
15

Amornraksa, Thumrongrat. A public key cryptosystem. 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Peng, Yanqun. High-speed implementation of the RSA cryptosystem. 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Peng, Yanqun. High-speed implementation of the RSA cryptosystem. 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Nishchal, Naveen K. Optical Cryptosystems. Iop Publishing Ltd, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Ding, Jintai, Albrecht Petzoldt, and Dieter S. Schmidt. Multivariate Public Key Cryptosystems. Springer, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Ding, Jintai, Jason E. Gower, and Dieter S. Schmidt. Multivariate Public Key Cryptosystems. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Multivariate Public Key Cryptosystems. Springer US, 2006. http://dx.doi.org/10.1007/978-0-387-36946-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Ding, Jintai, Jason E. Gower, and Dieter S. Schmidt. Multivariate Public Key Cryptosystems. Springer London, Limited, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Ding, Jintai, Jason E. Gower, and Dieter S. Schmidt. Multivariate Public Key Cryptosystems. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Tietojärjestelmien suojaus. Espoo, Finland: Valtion Teknillinen Tutkimuskeskus, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Elliptic Curve Public Key Cryptosystems. Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Secure Communications and Asymmetric Cryptosystems. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Simmons, Gustavus. Secure Communications And Asymmetric Cryptosystems. Routledge, 2019. http://dx.doi.org/10.4324/9780429305634.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Simmons, Gustavus. Secure Communications and Asymmetric Cryptosystems. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Quantum Attacks On Publickey Cryptosystems. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Secure Communications and Asymmetric Cryptosystems. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Yan, Song Y. Quantum Attacks on Public-Key Cryptosystems. Springer, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Zhang, Jiang, and Zhenfeng Zhang. Lattice-Based Cryptosystems: A Design Perspective. Springer Singapore Pte. Limited, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Zhang, Jiang, and Zhenfeng Zhang. Lattice-Based Cryptosystems: A Design Perspective. Springer Singapore Pte. Limited, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Yan, Song Y. Quantum Attacks on Public-Key Cryptosystems. Springer, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Martin, Keith M. Public-Key Encryption. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0005.

Full text
Abstract:
In this chapter, we introduce public-key encryption. We first consider the motivation behind the concept of public-key cryptography and introduce the hard problems on which popular public-key encryption schemes are based. We then discuss two of the best-known public-key cryptosystems, RSA and ElGamal. For each of these public-key cryptosystems, we discuss how to set up key pairs and perform basic encryption and decryption. We also identify the basis for security for each of these cryptosystems. We then compare RSA, ElGamal, and elliptic-curve variants of ElGamal from the perspectives of performance and security. Finally, we look at how public-key encryption is used in practice, focusing on the popular use of hybrid encryption.
APA, Harvard, Vancouver, ISO, and other styles
36

Acar, Tolga. High-speed algorithms & architectures for number-theoretic cryptosystems. 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Multivariate Public Key Cryptosystems (Advances in Information Security). Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Acar, Tolga. High-speed algorithms & architectures for number-theoretic cryptosystems. 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Hakuta, Keisuke. Efficient Algorithms for Elliptic Curve Cryptosystems using Endomorphisms. Springer, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Martin, Keith M. Basic Principles. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0001.

Full text
Abstract:
This chapter serves as an introduction to the environment in which cryptography finds common use today. We discuss the need for cryptography, as well as the basic language and concepts that are used to describe a cryptographic system. We introduce the core security services, such as confidentiality, data integrity, and authentication, which are delivered by cryptography in order to support modern security technologies. We introduce both symmetric and public-key cryptosystems, and discuss the differences between them. Finally, we consider ways in which cryptosystems can be attacked or compromised.
APA, Harvard, Vancouver, ISO, and other styles
41

Halbutoğulları, Alper. Fast bit-level, word-level and parallel arithmetic in finite fields for elliptic curve cryptosystems. 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Halbutoğulları, Alper. Fast bit-level, word-level and parallel arithmetic in finite fields for elliptic curve cryptosystems. 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Bos, Joppe, and Martijn Stam, eds. Computational Cryptography. Cambridge University Press, 2021. http://dx.doi.org/10.1017/9781108854207.

Full text
Abstract:
The area of computational cryptography is dedicated to the development of effective methods in algorithmic number theory that improve implementation of cryptosystems or further their cryptanalysis. This book is a tribute to Arjen K. Lenstra, one of the key contributors to the field, on the occasion of his 65th birthday, covering his best-known scientific achievements in the field. Students and security engineers will appreciate this no-nonsense introduction to the hard mathematical problems used in cryptography and on which cybersecurity is built, as well as the overview of recent advances on how to solve these problems from both theoretical and practical applied perspectives. Beginning with polynomials, the book moves on to the celebrated Lenstra–Lenstra–Lovász lattice reduction algorithm, and then progresses to integer factorization and the impact of these methods to the selection of strong cryptographic keys for usage in widely used standards.
APA, Harvard, Vancouver, ISO, and other styles
44

Naccache, David, and Pascal Paillier. Public Key Cryptography: 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 Proceedings. Springer London, Limited, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Kim, Kwangjo. Public Key Cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, 2001. Proceedings. Springer London, Limited, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Zheng, Yuliang, and Hideki Imai. Public Key Cryptography: Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings. Springer London, Limited, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Kim, Kwangjo. Public Key Cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, ... (Lecture Notes in Computer Science). Springer, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

1935-, Lasker G. E., Shih Timothy K, International Institute for Advanced Studies in Systems Research and Cybernetics., and International Conference on Systems Research, Informatics and Cybernetics (9th : 1997 : Baden-Baden, Germany), eds. Advances in computer cybernetics: Multimedia computing and networking, multimedia presentation, interactive multimedia support systems, multiuser virtual worlds, platform architecture for multimedia tools, management schemes for collaborative computing, program transformation systems, cryptanalysis and cryptosystems, graph transformation framework, simulation based design and development, design and implementation of programming languages, object systems design, abstracting devices. Windsor, Ont: International Institute for Advanced Studies in Systems Research and Cybernetics, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography