Skip to search formSkip to main content>Semantic Scholar Semantic Scholar's Logo

Search

You are currently offline. Some features of the site may not work correctly.

Semantic Scholar uses AI to extract papers important to this topic.

Highly Cited

2004

Highly Cited

2004

Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security… Expand

Review

1998

Review

1998

William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and… Expand

Highly Cited

1997

Highly Cited

1997

The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer… Expand

Highly Cited

1996

Highly Cited

1996

From the Publisher:
A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the… Expand

Highly Cited

1995

Highly Cited

1995

From the Publisher:
The object of the book is to produce a general, comprehensive textbook that treats all the essential core… Expand

Highly Cited

1994

Highly Cited

1994

ebooks and guide Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptography Protocols Algorithms And… Expand

Highly Cited

1991

Highly Cited

1991

The notion of non-malleable cryptography, an extension of semantically secure cryptography, is defined. Informally, the… Expand

Highly Cited

1985

Highly Cited

1985

We discuss the use of elliptic curves in cryptography. In particular, we propose an analogue of the Diffie-Hellmann key exchange… Expand

Highly Cited

1982

Highly Cited

1982

From the Preface (See Front Matter for full Preface)
Electronic computers have evolved from exiguous experimental enterprises… Expand

Highly Cited

1976

Highly Cited

1976

Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to a… Expand