-
21by Pagourtzis, Aristeidis, Zachos, Efstathios, Παγουρτζής, Αριστείδης, Ζάχος, ΕυστάθιοςSubjects: “…Cryptographic Protocols…”
Published 2016
Get full text
7 -
22by Παγουρτζής, Αριστείδης, Ζάχος, Ευστάθιος, Pagourtzis, Aristeidis, Zachos, EfstathiosSubjects: “…Cryptographic Protocols…”
Published 2016
Get full text
Get full text
1 -
23
-
24Published 2014Table of Contents: “…Cryptanalysis -- Cryptographic protocols -- Fine-grain cryptographic protocols -- Key exchange…”
Full Text via HEAL-Link
Electronic eBook -
25Published 2012Table of Contents: “…Cryptanalysis -- Network security -- Cryptographic protocols -- Encryption -- S-box theory.…”
Full Text via HEAL-Link
Electronic eBook -
26Published 2017Table of Contents: “…Cryptographic Protocols -- Foundations -- Zero-Knowledge Proofs -- Symmetric Key Designs.…”
Full Text via HEAL-Link
Electronic eBook -
27Published 2016Table of Contents: “…Secret sharing -- Quantum cryptography -- Visual cryptography -- Cryptographic protocols.-Entropy…”
Full Text via HEAL-Link
Electronic eBook -
28Table of Contents: “…and Overview -- Finite Field Arithmetic -- Elliptic Curve Arithmetic -- Cryptographic Protocols…”
Full Text via HEAL-Link
Electronic eBook -
29Published 2017Table of Contents: “… -- Cryptographic protocols.…”
Full Text via HEAL-Link
Electronic eBook -
30Published 2013Table of Contents: “…Attack and defense -- Software and Web security -- Cryptanalysis -- Cryptographic protocol…”
Full Text via HEAL-Link
Electronic eBook -
31Published 2012Table of Contents: “… -- digital signature -- cryptanalysis, efficient implementation, cryptographic application -- cryptographic…”
Full Text via HEAL-Link
Electronic eBook -
32Published 2018Table of Contents: “… -- Signatures -- Cryptanalysis -- Cryptographic primitives -- Cryptographic protocols.…”
Full Text via HEAL-Link
Electronic eBook -
33Published 2016Table of Contents: “…Cryptanalysis -- Cryptographic Protocols -- Network and Systems Security and Access Control…”
Full Text via HEAL-Link
Electronic eBook -
34Published 2017Table of Contents: “…Network security -- Threat analysis -- Application security -- Cryptographic protocols…”
Full Text via HEAL-Link
Electronic eBook -
35Published 2016Table of Contents: “… -- Cryptographic Protocol -- Multi-Party Computation.…”
Full Text via HEAL-Link
Electronic eBook -
36Published 2016Table of Contents: “… -- Cryptographic Protocol -- Multi-Party Computation.…”
Full Text via HEAL-Link
Electronic eBook -
37
-
38Published 2016Table of Contents: “…Public-Key Cryptography -- Cryptographic Protocols -- Side-Channel Attacks -- Implementation…”
Full Text via HEAL-Link
Electronic eBook -
39Published 2005Table of Contents: “…Cryptography and Coding -- Cryptographic Protocols -- Intrusion Detection -- Security Models…”
Full Text via HEAL-Link
Electronic eBook -
40Published 2003Table of Contents: “… -- What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal…”
Full Text via HEAL-Link
Electronic eBook