-
1Published 2018Table of Contents: “…Cryptography -- Public-key cryptography -- Symmetric-key cryptography -- Crypto- graphic Protocols…”
Full Text via HEAL-Link
Electronic eBook -
2Published 2018Table of Contents: “…Privacy -- Internet misbehavior and protection -- Malware -- Symmetric key cryptography…”
Full Text via HEAL-Link
Electronic eBook -
3Published 2019Table of Contents: “…Symmetric Key Cryptography -- Public Key Cryptography -- Post-quantum Cryptography -- Signature…”
Full Text via HEAL-Link
Electronic eBook -
4Table of Contents: “…Introduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key…”
Full Text via HEAL-Link
Electronic eBook -
5Published 2014Table of Contents: “…Public-Key Encryption -- Authentication -- Symmetric Key Cryptography -- Zero-Knowledge Proofs…”
Full Text via HEAL-Link
Electronic eBook -
6Published 2018Table of Contents: “…Outsourced Computation and Searchable Encryption -- Symmetric Key Cryptography and Format…”
Full Text via HEAL-Link
Electronic eBook -
7Published 2013Table of Contents: “…Symmetric-key cryptography -- Public-key cryptography -- Algorithmic cryptanalysis -- Software…”
Full Text via HEAL-Link
Electronic eBook -
8Published 2016Table of Contents: “…Symmetric key cryptography -- Boolean Functions with Maximum Algebraic Immunity Based on Properties…”
Full Text via HEAL-Link
Electronic eBook -
9Table of Contents: “… Applications -- Exercises for Part 2 -- to Cryptography -- Symmetric Key Cryptography -- Asymmetric Key…”
Full Text via HEAL-Link
Electronic eBook -
10
-
11
-
12
-
13
-
14
-
15
-
16Published 2016Table of Contents: “… by Signatures with Predications on Ratees -- Symmetric Key Cryptography -- A New Adaptable Construction…”
Full Text via HEAL-Link
Electronic eBook -
17
-
18
-
19
-
20