Books on the topic 'Cryptosystem'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 48 books for your research on the topic 'Cryptosystem.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
K, Kokula Krishna Hari, ed. MIMO Wireless based Cryptosystem using Electronic Key Generation Unit. Chennai, India: Association of Scientists, Developers and Faculties, 2016.
Find full textZhang, Jiang, and Zhenfeng Zhang. Lattice-Based Cryptosystems. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8427-5.
Full textDing, Jintai, Albrecht Petzoldt, and Dieter S. Schmidt. Multivariate Public Key Cryptosystems. New York, NY: Springer US, 2020. http://dx.doi.org/10.1007/978-1-0716-0987-3.
Full textMenezes, A. J. Elliptic curve public key cryptosystems. Boston: Kluwer Academic Publishers, 1993.
Find full textMenezes, Alfred. Elliptic Curve Public Key Cryptosystems. Boston, MA: Springer US, 1993. http://dx.doi.org/10.1007/978-1-4615-3198-2.
Full textMenezes, Alfred. Elliptic Curve Public Key Cryptosystems. Boston, MA: Springer US, 1993.
Find full textYan, Song Y. Quantum Attacks on Public-Key Cryptosystems. Boston, MA: Springer US, 2013.
Find full textYan, Song Y. Quantum Attacks on Public-Key Cryptosystems. Boston, MA: Springer US, 2013. http://dx.doi.org/10.1007/978-1-4419-7722-9.
Full text1967-, Naccache David, and Paillier Pascal, eds. Public key cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 : proceedings. Berlin: Springer, 2002.
Find full text1943-, Imai Hideki, and Zheng Yuliang 1962-, eds. Public key cryptography: Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000 : proceedings. Berlin: Springer, 2000.
Find full textInternational, Workshop on Practice and Theory in Public Key Cryptography (5th 2002 Paris France). Public key cryptography: 4th [i.e. 5th] International Workshop on Practice and Theory in Public Key Cryptosystems [i.e. Cryptography], PKC 2002, Paris, France, February 12-14, 2002 : proceedings. Berlin: Springer, 2002.
Find full textKwangjo, Kim, ed. Public key cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001 Cheju Island, Korea, February 13-15, 2001 : proceedings /c Kwangjo Kim (ed.). New York: Springer, 2001.
Find full textMartin, Keith M. Theoretical versus Practical Security. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0003.
Full textMartin, Keith M. Historical Cryptosystems. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0002.
Full textDing, Jintai, Albrecht Petzoldt, and Dieter S. Schmidt. Multivariate Public Key Cryptosystems. Springer, 2020.
Find full textDing, Jintai, Jason E. Gower, and Dieter S. Schmidt. Multivariate Public Key Cryptosystems. Springer, 2008.
Find full textMultivariate Public Key Cryptosystems. Springer US, 2006. http://dx.doi.org/10.1007/978-0-387-36946-4.
Full textDing, Jintai, Jason E. Gower, and Dieter S. Schmidt. Multivariate Public Key Cryptosystems. Springer London, Limited, 2006.
Find full textDing, Jintai, Jason E. Gower, and Dieter S. Schmidt. Multivariate Public Key Cryptosystems. Springer, 2010.
Find full textTietojärjestelmien suojaus. Espoo, Finland: Valtion Teknillinen Tutkimuskeskus, 1987.
Find full textSimmons, Gustavus. Secure Communications And Asymmetric Cryptosystems. Routledge, 2019. http://dx.doi.org/10.4324/9780429305634.
Full textSimmons, Gustavus. Secure Communications and Asymmetric Cryptosystems. Taylor & Francis Group, 2019.
Find full textZhang, Jiang, and Zhenfeng Zhang. Lattice-Based Cryptosystems: A Design Perspective. Springer Singapore Pte. Limited, 2020.
Find full textZhang, Jiang, and Zhenfeng Zhang. Lattice-Based Cryptosystems: A Design Perspective. Springer Singapore Pte. Limited, 2021.
Find full textMartin, Keith M. Public-Key Encryption. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0005.
Full textAcar, Tolga. High-speed algorithms & architectures for number-theoretic cryptosystems. 1997.
Find full textMultivariate Public Key Cryptosystems (Advances in Information Security). Springer, 2006.
Find full textAcar, Tolga. High-speed algorithms & architectures for number-theoretic cryptosystems. 1997.
Find full textHakuta, Keisuke. Efficient Algorithms for Elliptic Curve Cryptosystems using Endomorphisms. Springer, 2020.
Find full textMartin, Keith M. Basic Principles. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0001.
Full textHalbutoğulları, Alper. Fast bit-level, word-level and parallel arithmetic in finite fields for elliptic curve cryptosystems. 1998.
Find full textHalbutoğulları, Alper. Fast bit-level, word-level and parallel arithmetic in finite fields for elliptic curve cryptosystems. 1998.
Find full textBos, Joppe, and Martijn Stam, eds. Computational Cryptography. Cambridge University Press, 2021. http://dx.doi.org/10.1017/9781108854207.
Full textNaccache, David, and Pascal Paillier. Public Key Cryptography: 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 Proceedings. Springer London, Limited, 2003.
Find full textKim, Kwangjo. Public Key Cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, 2001. Proceedings. Springer London, Limited, 2003.
Find full textZheng, Yuliang, and Hideki Imai. Public Key Cryptography: Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings. Springer London, Limited, 2004.
Find full textKim, Kwangjo. Public Key Cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, ... (Lecture Notes in Computer Science). Springer, 2001.
Find full text1935-, Lasker G. E., Shih Timothy K, International Institute for Advanced Studies in Systems Research and Cybernetics., and International Conference on Systems Research, Informatics and Cybernetics (9th : 1997 : Baden-Baden, Germany), eds. Advances in computer cybernetics: Multimedia computing and networking, multimedia presentation, interactive multimedia support systems, multiuser virtual worlds, platform architecture for multimedia tools, management schemes for collaborative computing, program transformation systems, cryptanalysis and cryptosystems, graph transformation framework, simulation based design and development, design and implementation of programming languages, object systems design, abstracting devices. Windsor, Ont: International Institute for Advanced Studies in Systems Research and Cybernetics, 1998.
Find full text