1018 results in Cryptography ,Cryptology and Coding
14 - Cryptographic protocols for security and identification
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 508-526
-
- Chapter
- Export citation
Contents
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp vii-xiv
-
- Chapter
- Export citation
Epigraph
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp v-vi
-
- Chapter
- Export citation
8 - Authentication and ownership protection
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 218-237
-
- Chapter
- Export citation
2 - The integers
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 32-81
-
- Chapter
- Export citation
9 - Groups, rings, and fields
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 238-293
-
- Chapter
- Export citation
4 - Cryptography based on the discrete logarithm
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 107-134
-
- Chapter
- Export citation
References
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 558-575
-
- Chapter
- Export citation
1 - Introduction
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 1-31
-
- Chapter
- Export citation
6 - Block ciphers
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 160-180
-
- Chapter
- Export citation
8 - Euclid's Algorithm
-
- Book:
- A Cryptography Primer
- Published online:
- 05 July 2014
- Print publication:
- 17 March 2014, pp 89-105
-
- Chapter
- Export citation
14 - Public-Key Cryptosystems and Digital Signatures
-
- Book:
- A Cryptography Primer
- Published online:
- 05 July 2014
- Print publication:
- 17 March 2014, pp 157-170
-
- Chapter
- Export citation
9 - Some Uses of Perfect Secrecy
-
- Book:
- A Cryptography Primer
- Published online:
- 05 July 2014
- Print publication:
- 17 March 2014, pp 106-117
-
- Chapter
- Export citation
Preface
-
- Book:
- A Cryptography Primer
- Published online:
- 05 July 2014
- Print publication:
- 17 March 2014, pp ix-xii
-
- Chapter
- Export citation
10 - Computational Problems, Easy and Hard
-
- Book:
- A Cryptography Primer
- Published online:
- 05 July 2014
- Print publication:
- 17 March 2014, pp 118-128
-
- Chapter
- Export citation
4 - Functions
-
- Book:
- A Cryptography Primer
- Published online:
- 05 July 2014
- Print publication:
- 17 March 2014, pp 32-48
-
- Chapter
- Export citation
Acknowledgments
-
- Book:
- A Cryptography Primer
- Published online:
- 05 July 2014
- Print publication:
- 17 March 2014, pp xiii-xiv
-
- Chapter
- Export citation
1 - Introduction
-
- Book:
- A Cryptography Primer
- Published online:
- 05 July 2014
- Print publication:
- 17 March 2014, pp 1-11
-
- Chapter
- Export citation
11 - Modular Exponentiation, Modular Logarithm, and One-Way Functions
-
- Book:
- A Cryptography Primer
- Published online:
- 05 July 2014
- Print publication:
- 17 March 2014, pp 129-142
-
- Chapter
- Export citation
Frontmatter
-
- Book:
- A Cryptography Primer
- Published online:
- 05 July 2014
- Print publication:
- 17 March 2014, pp i-iv
-
- Chapter
- Export citation