Cryptography made simple
DOI10.1007/978-3-319-21936-3zbMATH Open1401.94002OpenAlexW2296724465MaRDI QIDQ2634501FDOQ2634501
Authors: N. P. Smart
Publication date: 9 February 2016
Published in: Information Security and Cryptography (Search for Journal in Brave)
Full work available at URL: https://zenodo.org/record/4454746
Recommendations
factorizationcryptographydiscrete logarithmblock cipherstream ciphercryptographic protocolsprimalitycomputational security
Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory (94-01)
Cited In (30)
- Understanding cryptography. From established symmetric and asymmetric ciphers to post-quantum algorithms
- SPF-CA: a new cellular automata based block cipher using key-dependent S-boxes
- Title not available (Why is that?)
- Title not available (Why is that?)
- Algebra for cryptologists
- Construction of one-way hash functions with increased key space using adaptive chaotic maps
- A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
- Introduction to cryptography. Principles and applications
- Secure Multi-party Computation: Information Flow of Outputs and Game Theory
- Title not available (Why is that?)
- Modern cryptography: theory and practice
- Title not available (Why is that?)
- Title not available (Why is that?)
- CryptHOL: game-based proofs in higher-order logic
- Contemporary cryptography. With a foreword by Eugene H. Spafford
- Cryptography. Theory and practice
- Title not available (Why is that?)
- An introduction to classic cryptography. With an exposition of the mathematics of private and public key ciphers
- A Classical Introduction to Cryptography Exercise Book
- New properties of a composition of ordinary generating functions for primes
- Distributed key generation for SM9-based systems
- Round-optimal, fully secure distributed key generation
- Introduction to cryptography with open source software.
- CryptoSchool
- Modern cryptography primer. Theoretical foundations and practical applications
- Cryptography in the information society
- Title not available (Why is that?)
- Title not available (Why is that?)
- Secure rational numbers equivalence test based on threshold cryptosystem with rational numbers
- Modern cryptography with proof techniques and implementations
This page was built for publication: Cryptography made simple
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2634501)