Skip to search formSkip to main contentSkip to account menu

Books on cryptography

Known as: Practical cryptography 
Books on cryptography have been published sporadically and with highly variable quality for a long time. This is despite the tempting, though… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Hash functions are of fundamental importance in theoretical and in practical cryptography, and with the threat of quantum… 
Review
2018
Review
2018
-This is particularlytrue if the data from several sources are combined for some common task may be beneficial and speed up the… 
2014
2014
PURPOSE The MOR-EVE group consumed the same dose of the same supplement in the morning and late evening. While both groups… 
2014
2014
This work explores two methods for practical cryptography on mobile devices. The first method is a quantum-resistant key-exchange… 
2014
2014
In this paper we present the experimental results that more clearly than any theory suggest an answer to the question: when in… 
2011
2011
In this paper we intend to analyse, from a cryptographic perspective, a particular audio watermarking technique based on the… 
Review
2010
Review
2010
Side-channel attacks represent a very frequent and severe type of attack against implementations of cryptographic protocols. Most… 
2004
2004
Cryptography underlies the provision of security for just about every kind of communications network, and mobile networks are no… 
2002
2002
This note presents a practical cryptography protocol for transmitting classical and quantum information secretly and directly. 
2001
2001
The size of cryptographic keys belongs to aspects that are quite easily dealt with in theory but that have to be carefully…