Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,325,331 papers from all fields of science
Search
Sign In
Create Free Account
Books on cryptography
Known as:
Practical cryptography
Books on cryptography have been published sporadically and with highly variable quality for a long time. This is despite the tempting, though…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
American Cryptogram Association
Cipher
Ciphertext
Cryptanalysis
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Classical Proofs for the Quantum Collapsing Property of Classical Hash Functions
S. Fehr
IACR Cryptology ePrint Archive
2018
Corpus ID: 52977624
Hash functions are of fundamental importance in theoretical and in practical cryptography, and with the threat of quantum…
Expand
Review
2018
Review
2018
SECURE MULTI-PARTY COMPUTATION - A SURVEY
A. Singh
,
Vishal Passricha
2018
Corpus ID: 212709906
-This is particularlytrue if the data from several sources are combined for some common task may be beneficial and speed up the…
Expand
2014
2014
”Introduction to Cryptography with Open-Source Software”
Alasdair McAndrew
,
Abderrahmane Nitaj
2014
Corpus ID: 18142325
PURPOSE The MOR-EVE group consumed the same dose of the same supplement in the morning and late evening. While both groups…
Expand
2014
2014
Machine-Level Software Optimization of Cryptographic Protocols
Dieter Fishbein
2014
Corpus ID: 38804561
This work explores two methods for practical cryptography on mobile devices. The first method is a quantum-resistant key-exchange…
Expand
2014
2014
Minimizing the Time of Detection of Large (Probably) Prime Numbers
D. Vidakovic
,
Dusko Parezanovic
,
Zoran Vucetic
arXiv.org
2014
Corpus ID: 18260697
In this paper we present the experimental results that more clearly than any theory suggest an answer to the question: when in…
Expand
2011
2011
Analysis of a CSPE-based Audio Watermarking technique from a cryptographic perspective
James Molloy
,
P. Stefanov
,
Darren Healy
,
Ron Healy
,
Jian Wang
2011
Corpus ID: 56464050
In this paper we intend to analyse, from a cryptographic perspective, a particular audio watermarking technique based on the…
Expand
Review
2010
Review
2010
Leakage-Resilient Cryptography : A Survey of Recent Advances RESEARCH EXAM , Spring 2010
U. Diego
2010
Corpus ID: 16273709
Side-channel attacks represent a very frequent and severe type of attack against implementations of cryptographic protocols. Most…
Expand
2004
2004
Cryptography for mobile security
C. Mitchell
2004
Corpus ID: 61303558
Cryptography underlies the provision of security for just about every kind of communications network, and mobile networks are no…
Expand
2002
2002
Transmit Classical and Quantum Information Secretly
Li Yang
,
Ling-An Wu
2002
Corpus ID: 119370862
This note presents a practical cryptography protocol for transmitting classical and quantum information secretly and directly.
2001
2001
Practical cryptography-the key size problem : PGP after years
Lenka Fibíková
,
Jozef Vyskoč
2001
Corpus ID: 7027362
The size of cryptographic keys belongs to aspects that are quite easily dealt with in theory but that have to be carefully…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE