6385 results in Communications and signal processing
Acknowledgments
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp xix-xx
-
- Chapter
- Export citation
7 - Stream ciphers
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 181-217
-
- Chapter
- Export citation
![](https://assets.cambridge.org/97811070/14275/cover/9781107014275.jpg)
Cryptography and Secure Communication
-
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014
12 - Cryptography based on bilinear pairings
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 422-474
-
- Chapter
- Export citation
10 - Cryptography based on elliptic curves
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 294-368
-
- Chapter
- Export citation
3 - Cryptography based on the integer ring
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 82-106
-
- Chapter
- Export citation
15 - More public-key cryptography
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 527-557
-
- Chapter
- Export citation
Index
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 576-587
-
- Chapter
- Export citation
13 - Implementation
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 475-507
-
- Chapter
- Export citation
14 - Cryptographic protocols for security and identification
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 508-526
-
- Chapter
- Export citation
Contents
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp vii-xiv
-
- Chapter
- Export citation
Epigraph
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp v-vi
-
- Chapter
- Export citation
8 - Authentication and ownership protection
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 218-237
-
- Chapter
- Export citation
2 - The integers
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 32-81
-
- Chapter
- Export citation
9 - Groups, rings, and fields
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 238-293
-
- Chapter
- Export citation
4 - Cryptography based on the discrete logarithm
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 107-134
-
- Chapter
- Export citation
References
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 558-575
-
- Chapter
- Export citation
1 - Introduction
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 1-31
-
- Chapter
- Export citation
6 - Block ciphers
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 160-180
-
- Chapter
- Export citation
2 - Queueing networks
-
- Book:
- Stochastic Networks
- Published online:
- 05 June 2014
- Print publication:
- 27 February 2014, pp 22-48
-
- Chapter
- Export citation