## Home > Tags: cryptographic (Total 22 Records)

### Advances in Cryptology - EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, ... (Lecture Notes in Computer Science)

Cryptography By:Phong Q. Nguyen 2014-04-02 00:00:00

This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions annual international conference, cryptographic techniques, public key cryptanalysis, lecture notes, multi linear maps

Tags:
*computer*
*cryptographic*
*application*
*technique*
*theory*
*lecture*
*science*
*cryptology*
*annual*
*conference*
*copenhagen*
*eurocrypt*

### Internet Security: Cryptographic Principles, Algorithms and Protocols

Cryptography By:Man Young Rhee 2003-04-02 00:00:00

Knowledge of number theory and abstract algebra are pre-requisites for any engineer designing a secure internet-based system. However, most of the books currently available on the subject are aimed at practitioners who just want to know how the various tools available on the market work and what lev cryptographic principles, internet security, relevant cryptographic principles, links cryptographic principles, secure internet-based system.

### Construction and Analysis of Cryptographic Functions

Cryptography By:Lilya Budaghyan 2015-01-07 00:00:00

This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions. These functions have optimal resistance to linear and/or differential attacks, which are the two most powerful attacks optimal cryptographic functions, cryptographic functionsthis book, longstanding open problems, quantum information theory, cryptographic applications

### Advances in Cryptology - EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French ... Computer Science / Security and Cryptology)

Cryptography By:Henri Gilbert 2010-07-16 00:00:00

This book constitutes the refereed proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2010, held on the French Riviera, in May/June 2010. The 33 revised full papers presented together with 1 invited lecture were carefully rev 29th annual international, annual international conference, cryptographic techniques, cryptology, proofs multiparty protocols

Tags:
*computer*
*cryptographic*
*security*
*application*
*technique*
*theory*
*science*
*cryptology*
*annual*
*conference*
*french*
*eurocrypt*

### Adaptive Cryptographic Access Control

Cryptography By:Anne V. D. M. Kayem, Selim G. Akl, Patrick Martin 2010-00-00 00:00:00

Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access control will benefit companies, governments an cryptographic access control, adaptive cryptographic access, cryptographic access controlcryptographic, cryptographic key management, book.adaptive cryptographic access

Tags:
*cryptographic*
*access*
*control*

### Symmetric Cryptographic Protocols

Cryptography By:Mahalingam Ramkumar 2014-08-06 00:00:00

This book focuses on protocols and constructions that make good use of the building blocks for symmetric cryptography. The book brings under one roof, several esoteric strategies of utilizing symmetric cryptographic blocks. The specific topics addressed by the book include various key distribution symmetric cryptographic protocolsthis, symmetric cryptographic blocks, trees.symmetric cryptographic protocols, symmetric cryptography, various key distribution

Tags:
*cryptographic*
*protocols*
*symmetric*

### Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings (Lecture Notes in Computer Science)

Algorithms By:Marc Joye 2004-07-28 00:00:00

The 32 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on side channels, modular multiplication, low resources, implementation aspects, collision attacks, fault attacks, hardware implementation, and authentication international workshop cambridge, embedded systems, lecture notes, fault attacks, collision attacks

Tags:
*computer*
*cryptographic*
*system*
*lecture*
*science*
*hardware*
*embedded*
*proceedings*
*cambridge*
*ches*

### Adaptive Cryptographic Access Control

Cryptography By:Anne V. D. M. Kayem, Selim G. Akl, Patrick Martin 2010-00-00 00:00:00

Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access control will benefit companies, governments an cryptographic access control, adaptive cryptographic access, cryptographic access controlcryptographic, cryptographic key management, book.adaptive cryptographic access

Tags:
*cryptographic*
*access*
*control*

### A Brief History of Cryptology and Cryptographic Algorithms (SpringerBriefs in Computer Science)

Cryptography By:John F Dooley 2013-10-31 00:00:00

The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over 2,000 years, the de cryptographic algorithms, cryptology, brief history, increasingly complicated systems, science

Tags:
*computer*
*cryptographic*
*algorithm*
*science*
*cryptology*
*brief*
*history*
*springerbriefs*

### BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic

Cryptography By:Tom St Denis 2006-09-04 00:00:00

Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide support for integers which are relatively small and single precision. The purpose of this text is to instruct the reader regarding how to implement efficien cryptographic multiple precision, precision arithmeticimplementing cryptography, multiple precision arithmetic, efficient multiple precision, cryptanalytic attacks

Tags:
*bignum*
*math*
*cryptographic*
*multiple*
*precision*
*arithmetic*