Books on the topic 'Mathematics – Cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Mathematics – Cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
The mathematics of public key cryptography. Cambridge: Cambridge University Press, 2012.
Find full textCryptography: Diffusing the confusion. Baldock, Hertfordshire, England: Research Studies Press, 2001.
Find full textBuchmann, Johannes A. Introduction to Cryptography. New York, NY: Springer US, 2001.
Find full textLam, Kwok-Yan. Cryptography and Computational Number Theory. Basel: Birkhäuser Basel, 2001.
Find full text1955-, Pipher Jill Catherine, and Silverman Joseph H. 1955-, eds. An introduction to mathematical cryptography. New York: Springer, 2008.
Find full textGoldreich, Oded. Foundations of cryptography: Basic applications. Cambridge: Cambridge University Press, 2009.
Find full textNumber-theoretic algorithms in cryptography. Providence, R.I: American Mathematical Society, 2007.
Find full textTing-i, Pʻei, and Salomaa Arto, eds. Chinese remainder theorem: Applications in computing, coding, cryptography. Singapore: World Scientific, 1996.
Find full textMario, Pivk, and SpringerLink (Online service), eds. Applied Quantum Cryptography. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.
Find full textTakagi, Tsuyoshi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, and Yasuhiko Ikematsu, eds. International Symposium on Mathematics, Quantum Theory, and Cryptography. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-5191-8.
Full textC, Washington Lawrence, ed. Introduction to cryptography: With coding theory. 2nd ed. Upper Saddle River, N.J: Pearson Prentice Hall, 2005.
Find full textC, Washington Lawrence, ed. Introduction to cryptography: With coding theory. Upper Saddle River, NJ: Prentice Hall, 2002.
Find full textFoundations of cryptography: Basic tools. Cambridge, U.K: Cambridge University Press, 2001.
Find full textThe mathematics of ciphers: Number theory and RSA cryptography. Natick, Mass: A K Peters, 1999.
Find full textRosenberger, Gerhard, Ulrich Hertrampf, and Manfred Kufleitner. Discrete Algebraic Methods: Arithmetic, Cryptography, Automata and Groups. Berlin: De Gruyter, 2016.
Find full textVeni, Madhavan C. E., ed. Public-key cryptography: Theory and practice. Upper Saddle River: Pearson Education, 2009.
Find full textFoundations of logic and mathematics: Applications to computer science and cryptography. Boston: Birkhäuser, 2002.
Find full textNievergelt, Yves. Foundations of Logic and Mathematics: Applications to Computer Science and Cryptography. Boston, MA: Birkhäuser Boston, 2002.
Find full textVigoureux, Pierre. Cryptographie: Libertés individuelles et codes secrets. Paris: Ellipses, 2006.
Find full textGoldreich, Oded. Modern Cryptography, Probabilistic Proofs and Pseudorandomness. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999.
Find full textservice), SpringerLink (Online, ed. Finite Automata and Application to Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009.
Find full textMaria, Piacentini Cattaneo Giulia, Ciliberto C. (Ciro) 1950-, and SpringerLink (Online service), eds. Elementary Number Theory, Cryptography and Codes. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009.
Find full textIntroduction to cryptography with mathematical foundations and computer implementations. Boca Raton: Chapman & Hall/CRC, 2010.
Find full textStanoyevitch, Alexander. Introduction to cryptography with mathematical foundations and computer implementations. Boca Raton: Chapman & Hall/CRC, 2010.
Find full textJan, Pelzl, ed. Understanding cryptography: A textbook for students and practitioners. Heidelberg: Springer, 2010.
Find full textIntroduction to cryptography with open-source software. Boca Raton, FL: CRC Press, 2011.
Find full textVasilenko, O. N. Teoretiko-chislovye algoritmy v kriptografii. Moskva: MT︠S︡NMO. Moskovskiĭ t︠s︡entr nepreryvnogo matematicheskogo obrazovanii︠a︡, 2006.
Find full textVisual cryptography and secret image sharing. Boca Raton, FL: Taylor & Francis, 2011.
Find full text1974-, Miller Steven J., ed. The mathematics of encryption: An elementary introduction. Providence, Rhode Island: American Mathematical Society, 2013.
Find full textFekri, Faramarz. Finite-field wavelets and their applications in cryptography and coding. Boston: Pearson/Prentice Hall, 2011.
Find full text1953-, Luengo Ignacio, Universidad Internacional Menéndez Pelayo, and Real Sociedad Matemática Española, eds. Recent trends in cryptography: UIMP-RSME Santaló Summer School, July 11-15, 2005, Universidad Internacional Menéndez Pelayo, Santander, Spain. Providence, R.I: American Mathematical Society, 2009.
Find full textMirbach, Andreas. Elliptische Kurven: Die Bestimmung ihrer Punktezahl und Anwendung in der Kryptographie. Münster: Verlagshaus Monsenstein und Vannerdat, 2003.
Find full textBenjamin, Arthur. Discrete mathematics. Chantilly, VA: The Teaching Company, 2009.
Find full textTakagi, Tsuyoshi, and Kirill Morozov. Mathematics of Post-quantum Cryptography. Springer, 2020.
Find full textSilverman, Joseph H., Jeffrey Hoffstein, and Jill Pipher. An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics). Springer, 2013.
Find full textIntroduction to Cryptography (Undergraduate Texts in Mathematics). Springer, 2004.
Find full textIntroduction to Cryptography (Undergraduate Texts in Mathematics). Springer, 2004.
Find full textCryptography: Theory and Practice (Textbooks in Mathematics). Chapman and Hall/CRC, 2018.
Find full textSilverman, Joseph H., Jeffrey Hoffstein, and Jill Pipher. An Introduction to Mathematical Cryptography. Springer, 2016.
Find full textSilverman, Joseph H., Jeffrey Hoffstein, and Jill Pipher. An Introduction to Mathematical Cryptography. Springer, 2014.
Find full textCarlet, Claude. Boolean Functions for Cryptography and Coding Theory. University of Cambridge ESOL Examinations, 2020.
Find full textBuchmann, Johannes, Daniel J. Bernstein, and Erik Dahmén. Post Quantum Cryptography. 2009.
Find full textPei, D., A. Salomaa, and C. Ding. Chinese Remainder Theorem: Applications in Computing, Coding, Cryptography. World Scientific Publishing Company, 1999.
Find full textKollmitzer, Christian, and Mario Pivk. Applied Quantum Cryptography. Springer, 2011.
Find full text