Search

Your search keyword '"*CRYPTOGRAPHY"' showing total 138,634 results

Search Constraints

Start Over You searched for: Descriptor "*CRYPTOGRAPHY" Remove constraint Descriptor: "*CRYPTOGRAPHY"
138,634 results on '"*CRYPTOGRAPHY"'

Search Results

1. The Zimmermann Telegram. Teaching with Documents.

2. Information Security and Privacy in Network Environments.

3. Developing Mathematical Thinking Using Codes and Ciphers.

5. Report of the Public Cryptography Study Group.

6. LISLEX: Legal Issues of Concern to the Library and Information Sector.

7. Applications of Maple To Algebraic Cryptography.

8. Using Clock Arithmetic to Send Secret Messages.

9. Security Issues on the Internet.

10. Sixth Annual Conference on Computers, Freedom, and Privacy: The RealAudio Proceedings.

11. The Integrity of Digital Information: Mechanics and Definitional Issues.

12. The Other Memex: The Tangled Career of Vannevar Bush's Information Machine, the Rapid Selector.

13. Number Theory and Public-Key Cryptography.

14. Calculator Cryptography.

15. Privacy for the Twenty-First Century: Cryptography.

16. Conventional Cryptography.

17. Science and Technology Resources on the Internet: Computer Security.

20. Ciphers as an Enrichment Topic

21. Telecommunications Policy Research Conference. Computer and Communications Security Section. Papers.

22. From Greeks to Today: Cipher Trees and Computer Cryptography.

23. An Application of Number Theory to Cryptology.

24. Views on Science Books.

25. Cryptographic Research and NSA: Report of the Public Cryptography Study Group.

26. Public Key Cryptography.

27. Confidential Computing or Cryptographic Computing?

28. A Security Model for Web-Based Communication.

29. Verifiable Quantum Advantage without Structure.

30. Fine-grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR.

31. A multi-party verifiable quantum proxy signature scheme based on quantum teleportation.

32. An Act of Self-indulgence? The Yamamoto Mission after Eighty Years.

33. Random permutation-based mixed-double scrambling technique for encrypting MQIR image.

34. THE RACE FOR ADVANCED ENCRYPTION: Strong encryption hasn't always been freely available to the public. Nate Drake tells the story of how the first Data Encryption Standard transformed the cryptography landscape

35. Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS) : requirements and procedures

36. Card-Based Protocols with Single-Card Encoding

38. An Efficient Hardware Implementation of Elliptic Curve Point Multiplication Over GF (2 m ) on FPGA

39. Shrinkable Ring Signatures: It Wasn’t Them!

40. Multi-way High-Throughput Implementation of Kyber

42. A Faster Variant of CGL Hash Function via Efficient Backtracking Checks

43. Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations

45. Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles

46. A Novel Key Generation Algorithm Utilizing Lattice-Based Cryptography Principles

47. An Evaluation of Hashing and Other Applied Cryptography Algorithms

48. Investigating the Role of Applied Cryptography in Digital Forensics

49. An Efficient Threshold Ring Signature from G+G Identification Protocol

Catalog

Books, media, physical & digital resources