-
1
-
2
-
3
-
4
-
5by Batten, Lynn MargaretTable of Contents: “…PUBLIC KEY CRYPTOGRAPHY: Applications and Attacks; Contents; Preface; Acknowledgments; List…”
Published 2013
Full Text via HEAL-Link
eBook -
6
-
7
-
8
-
9Published 2001Table of Contents: “… Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding -- The Wide Trail…”
Full Text via HEAL-Link
Electronic eBook -
10Published 2001Table of Contents: “… Selective Payment Protocols -- Financial Cryptography Tools (I) -- Sharing Decryption in the Context…”
Full Text via HEAL-Link
Electronic eBook -
11
-
12
-
13
-
14Published 2003Table of Contents: “… Properties of BCH and Kasami Codes -- Applications of Coding in Cryptography -- Analysis and Design of Modern…”
Full Text via HEAL-Link
Electronic eBook -
15Published 1997Table of Contents: “… cryptosystem for financial applications -- Perspectives on financial cryptography -- Auditable metering…”
Full Text via HEAL-Link
Electronic eBook -
16Published 1999Table of Contents: “… for Designs to the Cryptography -- Further Results on the Relation Between Nonlinearity and Resiliency…”
Full Text via HEAL-Link
Electronic eBook -
17Published 2003Table of Contents: “…E-voting without 'Cryptography' -- An Implementation of a Universally Verifiable Electronic Voting…”
Full Text via HEAL-Link
Electronic eBook -
18Published 2002Table of Contents: “… Authentication Protocol -- Anonymity without 'Cryptography' -- Fair Tracing without Trustees -- Invited Talk…”
Full Text via HEAL-Link
Electronic eBook -
19
-
20Published 2016Table of Contents: “… Encryption: Enforcing Information Flow with Cryptography.…”
Full Text via HEAL-Link
Electronic eBook