To see the other types of publications on this topic, follow the link: Cryptography.

Books on the topic 'Cryptography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Cryptography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Stinson, Douglas R., and Maura B. Paterson. Cryptography. Fourth edition. | Boca Raton : CRC Press, Taylor & Francis: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9781315282497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rubinstein-Salzedo, Simon. Cryptography. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94818-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Slayton, Rebecca, ed. Democratizing Cryptography. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3549993.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Franklin, Matthew, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48390-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Omondi, Amos R. Cryptography Arithmetic. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-34142-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Easttom, William. Modern Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63115-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hirschfeld, Rafael, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-63594-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hirchfeld, Rafael, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0055468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ferguson, Niels, Bruce Schneier, and Tadayoshi Kohno. Cryptography Engineering. Indianapolis, Indiana: Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781118722367.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Blaze, Matt, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36504-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Frankel, Yair, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45472-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Paar, Christof, and Jan Pelzl. Understanding Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04101-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Wright, Rebecca N., ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45126-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Grasselli, Federico. Quantum Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-64360-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Juels, Ari, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b98935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Syverson, Paul, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-46088-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Hershey, J. E. Cryptography demystified. New York: McGraw-Hill, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Easttom, William. Modern Cryptography. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-12304-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Alex, Moldovyan, ed. Innovative cryptography. 2nd ed. Boston: Charles River Media, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Knudsen, Jonathan. Java cryptography. Sebastopol, Calif: O'Reilly, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Oppliger, Rolf. Contemporary cryptography. 2nd ed. Boston: Artech House, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Paar, Christof, Jan Pelzl, and Tim Güneysu. Understanding Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2024. http://dx.doi.org/10.1007/978-3-662-69007-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

1963-, Schneier Bruce, ed. Practical cryptography. New York: Wiley, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

1953-, Baker Doris M., ed. Cryptography decrypted. Boston, MA: Addison-Wesley, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Garrett, Paul, and Daniel Lieman, eds. Public-Key Cryptography. Providence, Rhode Island: American Mathematical Society, 2005. http://dx.doi.org/10.1090/psapm/062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Buell, Duncan. Fundamentals of Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73492-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Cheon, Jung Hee, and Jean-Pierre Tillich, eds. Post-Quantum Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81293-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Nissim, Kobbi, and Brent Waters, eds. Theory of Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90453-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Nissim, Kobbi, and Brent Waters, eds. Theory of Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90456-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Nissim, Kobbi, and Brent Waters, eds. Theory of Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90459-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Paterson, Maura B., ed. Cryptography and Coding. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92641-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Wachter-Zeh, Antonia, Hannes Bartz, and Gianluigi Liva, eds. Code-Based Cryptography. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98365-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Rogers, Daniel J. Broadband Quantum Cryptography. Cham: Springer International Publishing, 2010. http://dx.doi.org/10.1007/978-3-031-02513-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Cryptography Cryptography Cryptography Cryptography. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Martin, Keith M. Control of Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0014.

Full text
Abstract:
In this chapter, we will discuss the complex issue of controlling the use of cryptography. We will identify a societal dilemma that arises from the use of cryptography. We will present arguments for and against control of use of cryptography, as well as identifying a number of different strategies for doing so. We will then review various historical approaches that have been adopted for trying to control the use of cryptography, including backdoors, export controls, and key escrow. We then consider the control of cryptography in the modern era, illustrating that the ubiquity and complexity of technology using cryptography provides both challenges and opportunities for undermining cryptographic protection.
APA, Harvard, Vancouver, ISO, and other styles
36

Martin, Keith M. Cryptography for Personal Devices. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0013.

Full text
Abstract:
In this chapter, we consider some of the cryptography which can be used to protect data stored on personal devices. We begin by looking at various forms of cryptographic file protection, including full disk encryption. We then consider the cryptography which can be used to support two applications widely used on personal devices, namely, email and asynchronous messaging. To illustrate the latter, we discuss the cryptography deployed by the application WhatsApp. Finally, we obtain a slightly different perspective by providing an overview of the cryptography supported by one particular device platform, Apple’s iOS operating system.
APA, Harvard, Vancouver, ISO, and other styles
37

Martin, Keith. Everyday Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.001.0001.

Full text
Abstract:
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient technologies and overwhelming theoretical research. The first part of the book provides essential background, identifying the core security services provided by cryptography. The next part introduces the main cryptographic mechanisms that deliver these security services such as encryption, hash functions, and digital signatures, discussing why they work and how to deploy them, without delving into any significant mathematical detail. In the third part, the important practical aspects of key management are introduced, which is essential for making cryptography work in real systems. The last part considers the application of cryptography. A range of application case studies is presented, alongside a discussion of the wider societal issues arising from use of cryptography to support contemporary cyber security.
APA, Harvard, Vancouver, ISO, and other styles
38

Smart, Nigel. Cryptography: An Introduction. Mcgraw-Hill College, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Smart, Nigel. Cryptography: An Introduction. Mcgraw-Hill College, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Buchanan, William J. Cryptography. River Publishers, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

), Hazell (Prestigiateur Pseud. Cryptography. Franklin Classics Trade Press, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Stinson, Douglas R. Cryptography. Chapman and Hall/CRC, 2005. http://dx.doi.org/10.1201/9781420057133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Cryptography. River Publishers, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Cryptography. New York, USA: McGraw Hill Education, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Rubinstein-Salzedo, Simon. Cryptography. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Buchanan, William. Cryptography. River Publishers, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Buchanan, William. Cryptography. River Publishers, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Buchanan, William J. Cryptography. River Publishers, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Buchanan, William. Cryptography. River Publishers, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

), Hazell (Prestigiateur Pseud. Cryptography. Creative Media Partners, LLC, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography