Book:Cryptography

Results: 81



#Item
1

Chapter 17 Lattice Basis Reduction This is a chapter from version 1.1 of the book “Mathematics of Public Key Cryptography” by Steven Galbraith, available from http://www.isg.rhul.ac.uk/˜sdg/crypto-book/ The copyrig

Add to Reading List

Source URL: www.math.auckland.ac.nz

- Date: 2014-01-05 18:06:58
    2Cryptography / Technology / Technical communication / Book design / Language / Ames /  Iowa / Table of contents / Specification / Air Ministry Experimental Station / Public key certificate / Section / European Aviation Safety Agency

    Title Page REPAIR STATION OPERATIONS SPECIFICATIONS MANUAL

    Add to Reading List

    Source URL: www.airbornemx.com

    Language: English - Date: 2016-08-22 11:30:33
    3Digital media / Copyright law / Cryptography law / Digital rights management / Media technology / Humble Bundle / E-book / ITunes Store

    Microsoft Word - EFF et al. Letter to FTC re DRM Labelling for Electronic Retailers.docx

    Add to Reading List

    Source URL: assets.documentcloud.org

    Language: English - Date: 2016-08-05 19:06:51
    4Security / Prevention / Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / Acceptable use policy / Authorization / Freedom of information laws by country / Privacy

    RUTGERS POLICY Section: Section Title: Information Technology Policy Name: Acceptable Use Policy for Information Technology Resources Formerly Book: N/A Approval Authority: Senior Vice President for Administration

    Add to Reading List

    Source URL: policies.rutgers.edu

    Language: English - Date: 2016-08-22 21:33:41
    5Publishing / Business / Mass media / Electronic publishing / Copyright law / Cryptography law / Digital rights management / Universal Windows Platform apps / Rakuten / ITunes Store / E-book / Fictionwise

    Microsoft Word - EFF Request for Investigation re Labeling DRM-Limited Products.docx

    Add to Reading List

    Source URL: assets.documentcloud.org

    Language: English - Date: 2016-08-05 19:06:54
    6Cryptography / Public-key cryptography / Elliptic curve cryptography / Finite fields / Elliptic curve / RSA Security / National Security Agency / Index of cryptography articles / Book:Cryptography

    Algorithmic number theory and cryptography — Comité des projets, Bordeaux Damien R󰀻󰀮󰀱󰀾󰁀 Équipe LFANT, Inria Bordeaux Sud-Ouest

    Add to Reading List

    Source URL: www.normalesup.org

    Language: English - Date: 2014-08-21 15:44:55
    7Public-key cryptography / Cryptography / Key management / DNSSEC / Domain Name System Security Extensions / Cryptographic hash function / Cryptosystem / Digital signature / Book:Cryptography / Index of cryptography articles

    An Overview of DNSSEC August 04, 2011. Carlos Martínez-Cagnazzo carlos @ lacnic.net

    Add to Reading List

    Source URL: www.labs.lacnic.net

    Language: English - Date: 2011-09-08 15:41:30
    8Cryptography / Applied mathematics / Key management / Cipher / Cryptanalysis / Block cipher / One-time pad / Data Encryption Standard / Key / Index of cryptography articles / Book:Cryptography

    Modern Cryptography M. Edwards Recap Evolution of Cryptography

    Add to Reading List

    Source URL: xn--bta-yla.net

    Language: English - Date: 2014-12-31 11:24:35
    9

    Table of Contents 1 Introduction to Cryptography and Data Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1 Overview on the Field of Cryptology (and this Book) .

    Add to Reading List

    Source URL: wiki.crypto.rub.de

    Language: English
      10

      Review of the book ”Understanding Cryptography” by Christof Paar and Jan Pelzl Springer, 2010 ISBN:

      Add to Reading List

      Source URL: wiki.crypto.rub.de

      Language: English - Date: 2010-11-11 05:29:19
        UPDATE