To see the other types of publications on this topic, follow the link: Software cryptography.

Books on the topic 'Software cryptography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Software cryptography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Moyle, Ed. Cryptographic libraries for developers. Charles River Media, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wootten, David Raiman. A graphic user interface for rapid integration of steganography software. Naval Postgraduate School, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Micciancio, Daniele. Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings. Springer Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ishai, Yuval. Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings. International Association for Cryptologic Research, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Desmedt, Yvo G. Public Key Cryptography -- PKC 2003: 6th International Workshop on Practice and Theory in Public Key Cryptography Miami, FL, USA, January 6-8, 2003 Proceedings. Springer-Verlag Berlin Heidelberg, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sahai, Amit. Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Catalano, Dario. Public Key Cryptography – PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings. International Association for Cryptologic Research, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

service), SpringerLink (Online, ed. Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United, States Congress House Committee on Foreign Affairs Subcommittee on Economic Policy Trade and Environment. Export controls on mass market software: Hearing before the Subcommittee on Economic Policy, Trade, and Environment of the Committee on Foreign Affairs, House of Representatives, One Hundred Third Congress, first session, October 12, 1993. U.S. G.P.O., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jasvir, Nagra, ed. Surreptitious software: Obfuscation, watermarking, and tamperproofing for program protection. Addison-Wesley, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

David, Hutchison. Public Key Cryptography – PKC 2009: 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings. Springer Berlin Heidelberg, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

International Workshop on Practice and Theory in Public Key Cryptography (13th 2010 Paris, France). Public key cryptography - PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010 : proceedings. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Johannes, Buchmann, Manulis Mark, and SpringerLink (Online service), eds. Public Key Cryptography – PKC 2012: 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

International Conference on Pairing-Based Cryptography (2nd 2008 Egham, England). Pairing-based cryptography - Pairing 2008: Second international conference, Egham, UK, September 1-3, 2008 ; proceedings. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

David, Hutchison. Cryptographic Hardware and Embedded Systems – CHES 2008: 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings. Springer-Verlag Berlin Heidelberg, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Biryukov, Alex. Selected Areas in Cryptography: 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers. Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

International Conference on Pairing-Based Cryptography (4th 2010 Yamanaka, Japan). Pairing-based cryptography - pairing 2010: 4th international conference, Yamanaka Hot Spring, Japan, December 13-15, 2010 : proceedings. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Wim, Van Dam. Theory of Quantum Computation, Communication, and Cryptography: 5th Conference, TQC 2010, Leeds, UK, April 13-15, 2010, Revised Selected Papers. Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

PQCrypto 2010 (2010 Darmstadt, Germany). Post-quantum cryptography: Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010 : proceedings. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

SCN 2010 (2010 Amalfi, Italy). Security and cryptography for networks: 7th international conference, SCN 2010, Amalfi, Italy, September 13-15, 2010 : proceedings. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Christianson, Bruce. Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers. Springer Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Pieprzyk, Josef. Topics in Cryptology - CT-RSA 2010: The Cryptographers’ Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings. Springer-Verlag Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

López, Javier. Applied Cryptography and Network Security: 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings. Springer-Verlag GmbH Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

service), SpringerLink (Online, ed. Topics in Cryptology – CT-RSA 2008: The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings. Springer-Verlag Berlin Heidelberg, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Fischer-Hübner, Simone. Privacy Enhancing Technologies: 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings. Authors, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Knudsen, Lars. Selected Areas in Cryptography: 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

ProvSec 2011 (2011 Xi'an, China). Provable security: 5th International Conference, PROVSEC 2011, Xi'an, China, October 16-18, 2011: proceedings. Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Somitra, Sanadhya, and SpringerLink (Online service), eds. Security, Privacy, and Applied Cryptography Engineering: Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Kiayias, Aggelos. Topics in Cryptology – CT-RSA 2011: The Cryptographers’ Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings. Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Abe, Masayuki. Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings. International Association for Cryptologic Research, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Iwama, Kazuo. Theory of Quantum Computation, Communication, and Cryptography: 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Serge, Vaudenay, and SpringerLink (Online service), eds. Selected Areas in Cryptography: 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

service), SpringerLink (Online, ed. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

International Conference in Cryptology in India (11th 2010 Hyderabad, India). Progress in cryptology - INDOCRYPT 2010: 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010 : proceedings. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

ICITS 2011 (2011 Amsterdam, Netherlands). Information theoretic security: 5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011 : proceedings. Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

service), SpringerLink (Online, ed. Financial Cryptography and Data Security: 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

1944-, Seberry Jennifer, Susilo Willy, and SpringerLink (Online service), eds. Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings. Springer-Verlag Berlin Heidelberg, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

ICITS 2009 (2009 Shizuoka, Japan). Information theoretic security: 4th international conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009 : revised selected papers. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Inscrypt 2009 (2009 Beijing, China). Information security and cryptology: 5th international conference, Inscrypt 2009, Beijing, China, December 12-15, 2009 : revised selected papers. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Spain), EUROCRYPT (2007 Barcelona. Advances in cryptology -- EUROCRYPT 2007: 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007 ; proceedings. Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Yalcin, Siddika Berna Ors. Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers. Springer Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

McAndrew, Alasdair. Introduction to Cryptography with Open-Source Software. CRC Press, 2016. http://dx.doi.org/10.1201/9781439825716.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

McAndrew, Alasdair. Introduction to Cryptography with Open-Source Software. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

McAndrew, Alasdair. Introduction to Cryptography with Open-Source Software. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Introduction to cryptography with open-source software. CRC Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Micciancio, Daniele. Theory of Cryptography. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Pardo, José Luis Gómez. Introduction to Cryptography with Maple. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Sessions, Julian Brently. Fast software implementations of block ciphers. 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Pardo, José Luis Gómez. Introduction to Cryptography with Maple. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Pardo, José Luis Gómez. Introduction to Cryptography with Maple. Springer, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!