Search

Your search keyword '"cryptography"' showing total 95,398 results

Search Constraints

Start Over You searched for: Descriptor "cryptography" Remove constraint Descriptor: "cryptography"
95,398 results on '"cryptography"'

Search Results

1. The Zimmermann Telegram. Teaching with Documents.

2. Information Security and Privacy in Network Environments.

3. Developing Mathematical Thinking Using Codes and Ciphers.

5. Report of the Public Cryptography Study Group.

6. LISLEX: Legal Issues of Concern to the Library and Information Sector.

7. Applications of Maple To Algebraic Cryptography.

8. Using Clock Arithmetic to Send Secret Messages.

9. Security Issues on the Internet.

10. Sixth Annual Conference on Computers, Freedom, and Privacy: The RealAudio Proceedings.

11. The Integrity of Digital Information: Mechanics and Definitional Issues.

12. The Other Memex: The Tangled Career of Vannevar Bush's Information Machine, the Rapid Selector.

13. Number Theory and Public-Key Cryptography.

14. Calculator Cryptography.

15. Privacy for the Twenty-First Century: Cryptography.

16. Conventional Cryptography.

17. Science and Technology Resources on the Internet: Computer Security.

20. Ciphers as an Enrichment Topic

21. Telecommunications Policy Research Conference. Computer and Communications Security Section. Papers.

22. From Greeks to Today: Cipher Trees and Computer Cryptography.

23. An Application of Number Theory to Cryptology.

24. Views on Science Books.

25. Cryptographic Research and NSA: Report of the Public Cryptography Study Group.

26. Public Key Cryptography.

27. Fine-grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR.

28. A multi-party verifiable quantum proxy signature scheme based on quantum teleportation.

29. An Act of Self-indulgence? The Yamamoto Mission after Eighty Years.

30. THE RACE FOR ADVANCED ENCRYPTION: Strong encryption hasn't always been freely available to the public. Nate Drake tells the story of how the first Data Encryption Standard transformed the cryptography landscape

31. Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS) : requirements and procedures

33. An Efficient Hardware Implementation of Elliptic Curve Point Multiplication Over GF (2 m ) on FPGA

34. Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations

35. An Evaluation of Hashing and Other Applied Cryptography Algorithms

36. Investigating the Role of Applied Cryptography in Digital Forensics

38. PARScoin: A Privacy-preserving, Auditable, and Regulation-friendly Stablecoin

39. Semi-automated and Easily Interpretable Side-Channel Analysis for Modern JavaScript

41. Deciphering Enigma

42. The Right to Communications Freedom

43. Quantum-Proof Secrets.

44. Cryptographic algorithms and key sizes for personal identity verification

45. Stochastic generation in a Josephson-like antiferromagnetic spin Hall oscillator driven by a pure AC current.

46. Recommendation for block cipher modes of operation : the CCM mode for authentication and confidentiality

48. A new image encryption algorithm with feedback key mechanism using two-dimensional dual discrete quadratic chaotic map.

49. Digital Image Processing under Modified Core Function Based on Residue Number System.

50. Integrating Fuzzy Graph Theory into Cryptography: A Survey of Techniques and Security Applications.

Catalog

Books, media, physical & digital resources