This book provides a brief and accessible introduction to the theory of finite fields and to some of their many …
This book collects the results of the workshops on Applications of Algebraic Curves and Applications of Finite Fieldsat the RICAMin …
Like its bestselling predecessor, Elliptic Curves: Number Theory and Cryptography, Second Edition develops the theory of elliptic curves to provide …
This book constitutes the refereed proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, …
PKC 2003 was the Sixth International Workshop on Practice and Theory in Public Key Cryptography and was sponsored by IACR, …
Proceedings of the 4th Intl Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, held February 12-14, 2002 …
This book constitutes the refereed proceedings of the 12th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2009, …
This book constitutes the refereed proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography, PKC …
This book constitutes the refereed proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, …
The 9th International Conference on Theory and Practice of Public-Key Cr- tography(PKC 2006) took place in New York City. PKC …
This book constitutes the refereed proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography, PKC …
This book constitutes the refereed proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography, PKC …
This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, …
The magnificent, unrivaled history of codes and ciphers -- how they
Cryptographic Engineering covers the theory and practice of engineering of cryptographic systems, including encryption and decryption engines, digital signature and …
A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical …
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. Introduction …
Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer …
This book systematically explores the statistical characteristics of cryptographic systems, the computational complexity theory of cryptographic algorithms and the mathematical …
This book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this …
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction …
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, …
The Joy of Cryptography is an undergraduate textbook in cryptography. This book grew out of lecture notes I developed for …
Discover how to take advantage of common cryptographic operations to build safer apps that respect users' privacy with the help …
It’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most …
Distributed ledgers, decentralization and smart contracts explained About This Book Get to grips with the underlying technical principles and implementations …
A cryptographic scheme is constructed so as to maintain a desired functionality, even under malicious attempts aimed at making it …
Computer Security: Principles and Practice, 2e, is ideal for courses in Computer/Network Security. In recent years, the need for education …
Computer Security, 5th Edition features a balanced presentation of both principles and practice. It incorporates broad and comprehensive coverage of …
The Belgian block cipher Rijndael was chosen in 2000 by the U.S. governments National Institute of Standards and Technology (NIST) …
This book constítutes the thoroughly refereed postproceedings of the 4th International Conference on the Advanced Encryption Standard, AES 2004, held …
This book, by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail …
An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace …
This is the authoritative guide to Rijndael, the block cipher whose elegance, efficiency, security, and principled design made it the …