Contents
Academic literature on the topic 'Public-Key-Kryptosystem'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Public-Key-Kryptosystem.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Dissertations / Theses on the topic "Public-Key-Kryptosystem"
Möller, Bodo. "Public key cryptography theory and practice /." [S.l. : s.n.], 2003. http://elib.tu-darmstadt.de/diss/000372.
Full textTakagi, Tsuyoshi. "New public-key cryptosystems with fast decryption." Phd thesis, [S.l. : s.n.], 2001. http://deposit.ddb.de/cgi-bin/dokserv?idn=962729302.
Full textLe, Van-Ly. "Polly two - a public key cryptosystem based on Polly cracker." [S.l. : s.n.], 2003. http://deposit.ddb.de/cgi-bin/dokserv?idn=967582806.
Full textWiesmaier, Alexander. "Secure private key management in adaptable public key infrastructures." Berlin mbv, Mensch-und-Buch-Verl, 2008. http://d-nb.info/998075051/04.
Full textTobias, Christian. "Design und Analyse kryptografischer Bausteine auf nicht-abelschen Gruppen." [S.l. : s.n.], 2004. http://deposit.ddb.de/cgi-bin/dokserv?idn=972517235.
Full textMusleh, Jens. "Untersuchung aktueller Sicherheitsmodelle bezüglich ihrer Eignung für den elektronischen Handel." [S.l. : s.n.], 2001. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB9231978.
Full textKutzner, Kendy. "Public Key Kryptografie mit GNU Privacy Guard." Universitätsbibliothek Chemnitz, 2002. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200201160.
Full textEisenbarth, Thomas. "Cryptography and cryptanalysis for embedded systems." Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2009. http://d-nb.info/1000474909/04.
Full textGüneysu, Tim Erhan. "Cryptography and cryptanalysis on reconfigurable devices security implementations for hardware and reprogrammable devices." Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2009. http://d-nb.info/994465785/04.
Full textBooks on the topic "Public-Key-Kryptosystem"
Horster, Patrick. Das Kryptosystem von Lu und Lee: Ein Public-Key-Kryptosystem, Attacken und Modifikationen. Heidelberg: A. Hüthig, 1989.
Find full textHorster, Patrick. Das Kryptosystem von McEliece: Ein Public-Key-Kryptosystem auf der Basis von Goppa-Codes. Heidelberg: Hüthig, 1990.
Find full textPrimality testing and integer factorization in public-key cryptography. Boston: Kluwer Academic Publishers, 2004.
Find full textInternational Workshop on Practice and Theory in Public Key Cryptography (13th 2010 Paris, France). Public key cryptography - PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010 : proceedings. Berlin: Springer, 2010.
Find full textDent, Alexander W. Practical Signcryption. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.
Find full textPQCrypto 2010 (2010 Darmstadt, Germany). Post-quantum cryptography: Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010 : proceedings. Berlin: Springer, 2010.
Find full textApproximative Public-Key-Kryptosysteme. Berlin, Heidelberg: Springer Berlin Heidelberg, 1989.
Find full textElliptische Kurven in der Kryptographie. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002.
Find full textDie 2. Dimension der IT-Sicherheit: Verletzlichkeitsreduzierende Technikgestaltung am Beispiel von Public Key Infrastrukturen. Wiesbaden: Vieweg+Teubner Verlag, 1999.
Find full textBook chapters on the topic "Public-Key-Kryptosystem"
Wätjen, Dietmar. "Exponentiationschiffren und das RSA-Public-Key-Kryptosystem." In Kryptographie, 71–91. Wiesbaden: Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-22474-5_5.
Full textWätjen, Dietmar. "Quadratische Reste und das Rabin-Public-Key-Kryptosystem." In Kryptographie, 165–76. Wiesbaden: Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-22474-5_9.
Full text