Search

Your search keyword '"*CRYPTOGRAPHY"' showing total 138,701 results

Search Constraints

Start Over You searched for: Descriptor "*CRYPTOGRAPHY" Remove constraint Descriptor: "*CRYPTOGRAPHY"
138,701 results on '"*CRYPTOGRAPHY"'

Search Results

1. The Zimmermann Telegram. Teaching with Documents.

2. Information Security and Privacy in Network Environments.

3. Developing Mathematical Thinking Using Codes and Ciphers.

5. Report of the Public Cryptography Study Group.

6. LISLEX: Legal Issues of Concern to the Library and Information Sector.

7. Applications of Maple To Algebraic Cryptography.

8. Using Clock Arithmetic to Send Secret Messages.

9. Security Issues on the Internet.

10. Sixth Annual Conference on Computers, Freedom, and Privacy: The RealAudio Proceedings.

11. The Integrity of Digital Information: Mechanics and Definitional Issues.

12. The Other Memex: The Tangled Career of Vannevar Bush's Information Machine, the Rapid Selector.

13. Number Theory and Public-Key Cryptography.

14. Calculator Cryptography.

15. Privacy for the Twenty-First Century: Cryptography.

16. Conventional Cryptography.

17. Science and Technology Resources on the Internet: Computer Security.

20. Ciphers as an Enrichment Topic

21. Telecommunications Policy Research Conference. Computer and Communications Security Section. Papers.

22. From Greeks to Today: Cipher Trees and Computer Cryptography.

23. An Application of Number Theory to Cryptology.

24. Views on Science Books.

25. Cryptographic Research and NSA: Report of the Public Cryptography Study Group.

26. Public Key Cryptography.

27. A Security Model for Web-Based Communication.

28. Verifiable Quantum Advantage without Structure.

29. Fine-grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR.

30. A multi-party verifiable quantum proxy signature scheme based on quantum teleportation.

31. An Act of Self-indulgence? The Yamamoto Mission after Eighty Years.

32. Indistinguishability Obfuscation from Well-Founded Assumptions.

33. Random permutation-based mixed-double scrambling technique for encrypting MQIR image.

34. THE RACE FOR ADVANCED ENCRYPTION: Strong encryption hasn't always been freely available to the public. Nate Drake tells the story of how the first Data Encryption Standard transformed the cryptography landscape

35. Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS) : requirements and procedures

37. An Efficient Hardware Implementation of Elliptic Curve Point Multiplication Over GF (2 m ) on FPGA

38. Shrinkable Ring Signatures: It Wasn’t Them!

39. Multi-way High-Throughput Implementation of Kyber

41. A Faster Variant of CGL Hash Function via Efficient Backtracking Checks

42. Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations

44. Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles

45. A Novel Key Generation Algorithm Utilizing Lattice-Based Cryptography Principles

46. An Evaluation of Hashing and Other Applied Cryptography Algorithms

47. Investigating the Role of Applied Cryptography in Digital Forensics

48. An Efficient Threshold Ring Signature from G+G Identification Protocol

50. Efficient Unbalanced Private Set Intersection Protocol over Large-Scale Datasets Based on Bloom Filter

Catalog

Books, media, physical & digital resources