Search Results - "cryptography"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 32
- Security measures 29
- Computer networks 24
- Cryptography 19
- Data encryption (Computer science) 12
- Data protection 9
- Access control 5
- Coding theory 5
- Computers 5
- Examinations 5
- Certification 4
- Computer science 4
- Electronic data processing personnel 4
- Mathematics 4
- Study guides 4
- Data structures (Computer science) 2
- Electronic commerce 2
- Electronic funds transfers 2
- Internet 2
- Management 2
- C (Computer program language) 1
- Chaotic behavior in systems 1
- Combinatorial analysis 1
- Computer file sharin 1
- Computer technicians 1
- Confidential communications 1
- Congresses 1
- Curves, Elliptic 1
- Data processing 1
- Data transmission systems 1
-
1
Cryptography : Infosec pro guide
Published 2013Table of Contents: “…1. The language of cryptography -- 2. History of cryptography -- 3. Components of cryptography -- 4. …”
-
2
-
3
-
4
-
5
-
6
Cryptography and network security : principles and practice
Published 2006Table of Contents: “…Introduction to number theory -- 9. Public-key cryptography and RSA -- 10. Key management; other public-key cryptosystems -- 11. …”
-
7
-
8
-
9
-
10
An introduction to mathematical cryptography
Published 2008Table of Contents: “…An introduction to cryptography -- 2. Discrete logarithms and Diffie-Hellman -- 3. …”
-
11
-
12
Cryptography made simple
Published 2016Table of Contents: “…Historical ciphers -- 3. Modern cryptography basics -- 4. Advanced protocols -- 5. Appendix…”
-
13
-
14
Introduction to cryptography and network security
Published 2008Table of Contents: “…Introduction 2. Mathematics of cryptography 3. Traditional symmetric-key ciphers 4. …”
-
15
Introduction to cryptography and network security
Published 2008Table of Contents: “…Introduction -- 1-Symmetric-key encipherment: 2. Mathematics of cryptography -- 3. Traditional symmetric-key ciphers -- 4. …”
Table of contents only
Publisher description
-
16
-
17
Handbook of financial cryptography and security
Published 2011“…Financial cryptography and security…”
-
18
-
19
New directions of modern cryptography
Published 2013Table of Contents: “…Introduction -- 2. Proxy re-cryptography -- 3. Attribute-based cryptography -- 4. …”
-
20