Books on the topic 'Encryption (Computer science)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Encryption (Computer science).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Springer Science+Business Media, LLC, 2011.
Find full textInformation Technology Laboratory (National Institute of Standards and Technology). Announcing the Advanced Encryption Standard (AES). Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2001.
Find full textLibrary of Congress. Congressional Research Service., ed. Encryption technology: Congressional issues. Congressional Research Service, Library of Congress, 2000.
Find full textSmith, Marcia S. Encryption technology: Congressional issues. Congressional Research Service, Library of Congress, 1998.
Find full textBiham, Eli. Differential cryptanalysis of the data encryption standard. Springer-Verlag, 1993.
Find full textXu, Zhengquan. Video encryption technology and application. Nova Science Publishers, 2010.
Find full textInternational Business Machines Corporation. International Technical Support Organization, ed. IBM System Storage Data Encryption. IBM, International Technical Support Organization, 2010.
Find full textXu, Zhengquan. Video encryption technology and application. Nova Science Publishers, 2010.
Find full textThomas, Friedlob G., and Institute of Internal Auditors, eds. An auditor's guide to encryption. The Institute of Internal Auditors, 1997.
Find full textEvangelos, Kranakis, and Van Oorschot Paul C, eds. Selected areas in cryptography. Kluwer Academic, 1997.
Find full textTamura, Shinsuke. Anonymous security systems and applications: Requirements and solutions. Information Science Reference, 2012.
Find full textStavroulakis, Peter, and Mark Stamp. Handbook of information and communication security. Springer, 2010.
Find full textLek, Kamol. Cryptography: Protocols, design, and applications. Nova Science Publishers, 2011.
Find full textNational Institute of Standards and Technology (U.S.), ed. Randomness testing of the advanced encryption standard candidate algorithms. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textMogollon, Manuel. Cryptography and security services: Mechanisms and applications. CyberTech Pub., 2007.
Find full textFoundation, Electronic Frontier, ed. Cracking DES: Secrets of encryption research, wiretap politics & chip design. Electronic Frontier Foundation, 1998.
Find full textJohannes, Buchmann, and Ding Jintai, eds. Post-quantum cryptography: Second international workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 proceedings. Springer, 2008.
Find full textStefan, Lucks, Sadeghi Ahmad-Reza, and Wolf Christopher, eds. Research in cryptology: Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, revised selected papers. Springer, 2008.
Find full textLian, Shiguo. Multimedia content encryption: Techniques and applications. Auerbach Publications, 2008.
Find full textNational Institute of Standards and Technology (U.S.), ed. Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2004.
Find full textBrassard, Gilles. Advances in Cryptology -- CRYPTO' 89 Proceedings. Springer-Verlag Berlin Heidelberg, 1990.
Find full textChaum, David. Advances in Cryptology -- EUROCRYPT' 87: Workshop on the Theory and Application of Cryptographic Techniques Amsterdam, the Netherlands, April 13-15, 1987 Proceedings. Springer-Verlag Berlin Heidelberg, 1988.
Find full textMenezes, Alfred J. Advances in Cryptology-CRYPT0' 90: Proceedings. Springer-Verlag Berlin Heidelberg, 1991.
Find full textMcCurley, Kevin S. Advances in Cryptology 1981-1997: Electronic Proceedings and Index of the CRYPTO and EUROCRYPT Conferences 1981-1997. Springer-Verlag Berlin Heidelberg, 1999.
Find full textA, Nazario Noel, and National Institute of Standards and Technology (U.S.), eds. General procedures for registering computer security objects. U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
Find full textStamp, Mark. Applied cryptanalysis: Breaking ciphers in the real world. John Wiley & Sons, 2007.
Find full textKiayias, Aggelos, and Serdar Pehlivanoglu. Encryption for Digital Content. Springer, 2012.
Find full textEncryption technology: Congressional issues. Congressional Research Service, Library of Congress, 1998.
Find full textBiham, Eli, and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer, 2011.
Find full textBiham, Eli, and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer, 2012.
Find full textauthor, Nelson Sharon D., Simek John W. author, and American Bar Association. Law Practice Management Division, eds. Encryption made simple for lawyers. American Bar Association, 2015.
Find full textCurtin, Matt. Brute Force: Cracking the Data Encryption Standard. Springer London, Limited, 2007.
Find full textCid, Carlos, Matthew Robshaw, and Sean Murphy. Algebraic Aspects of the Advanced Encryption Standard. Springer London, Limited, 2006.
Find full textCid, Carlos, Sean Murphy, and Matthew J. B. Robshaw. Algebraic Aspects of the Advanced Encryption Standard. Springer, 2010.
Find full textDaemen, Joan, and Vincent Rijmen. Design of Rijndael: The Advanced Encryption Standard. Springer Berlin / Heidelberg, 2021.
Find full textTanougast, Camel. Progress in Data Encryption Research. Nova Science Publishers, Incorporated, 2013.
Find full textDaemen, Joan, and Vincent Rijmen. The Design of Rijndael: The Advanced Encryption Standard. Springer, 2020.
Find full textDaemen, Joan, and Vincent Rijmen. Design of Rijndael: AES - the Advanced Encryption Standard. Springer London, Limited, 2013.
Find full textLian, Shiguo. Multimedia Content Encryption: Techniques and Applications. Taylor & Francis Group, 2008.
Find full textEncryption facility for z/OS V1.2 OpenPGP support. International Business Machines Corporation, 2007.
Find full text