Skip to search formSkip to main contentSkip to account menu

Books on cryptography

Known as: Practical cryptography 
Books on cryptography have been published sporadically and with highly variable quality for a long time. This is despite the tempting, though… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Hash functions are of fundamental importance in theoretical and in practical cryptography, and with the threat of quantum… 
2015
2015
Modern cryptography pushed forward the need of having provable security. Whereas ancient cryptography was only relying on… 
2014
2014
PURPOSE The MOR-EVE group consumed the same dose of the same supplement in the morning and late evening. While both groups… 
2014
2014
This work explores two methods for practical cryptography on mobile devices. The first method is a quantum-resistant key-exchange… 
2011
2011
In this paper we intend to analyse, from a cryptographic perspective, a particular audio watermarking technique based on the… 
Review
2010
Review
2010
Side-channel attacks represent a very frequent and severe type of attack against implementations of cryptographic protocols. Most… 
2004
2004
Cryptography underlies the provision of security for just about every kind of communications network, and mobile networks are no… 
2002
2002
This note presents a practical cryptography protocol for transmitting classical and quantum information secretly and directly. 
2001
2001
The size of cryptographic keys belongs to aspects that are quite easily dealt with in theory but that have to be carefully… 
2000
2000
  • 2000
  • Corpus ID: 236177689