Science / Cryptography eBooks

2015 | ISBN-10: 3319167146 | 524 pages | PDF | 11 MB This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA...

( Category:Cryptography Date:03 May 2015 )

English | June 12, 2007 | ISBN: 3540725393 | 601 Pages | PDF | 7 MB This book constitutes the refereed proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptog...

( Category:Cryptography Date:02 May 2015 )

English | 2015 | ISBN: 9814635898 | 480 pages | PDF | 37,4 MB This is the revised edition of Berlekamp's famous book, "Algebraic Coding Theory", originally published in 1968, wherein he introduced sev...

( Category:Cryptography Date:21 Apr 2015 )

English | 2015 | ISBN: 9814635898 | 480 pages | PDF | 37,4 MB This is the revised edition of Berlekamp's famous book, "Algebraic Coding Theory", originally published in 1968, wherein he introduced sev...

( Category:Cryptography Date:19 Apr 2015 )

2001 | 281 Pages | ISBN: 1468404989 | PDF | 11 MB Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, etc. Therefore, ...

( Category:Cryptography Date:09 Apr 2015 )

English | Mar 2003 | ISBN: 1931769125 | 412 Pages | CHM | 11 MB Covering the specific issues related to developing fast block ciphers using software and hardware implementation, this book provides a g...

( Category:Cryptography Date:09 Apr 2015 )

by John F Dooley English | 2013 | ISBN: 331901627X | 118 pages | PDF | 3.46 MB The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communi...

( Category:Cryptography Date:09 Apr 2015 )

English | ISBN: 1584888369 | 2015 | 244 pages | PDF | 3 MB Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and...

( Category:Cryptography Date:09 Apr 2015 )

2015 | 172 Pages | ISBN: 3319123696 | PDF | 6 MB This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ...

( Category:Cryptography Date:05 Feb 2015 )

2014 | ISBN-10: 9814623741 | 456 pages | PDF | 3 MB Integer Algorithms in Cryptology and Information Assurance is a collection of the author's own innovative approaches in algorithms and protocols for...

( Category:Cryptography Date:15 Oct 2014 )

2013 | ISBN-10: 1466567805 | 381 pages | PDF | 4 MB Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no bo...

( Category:Cryptography Date:25 Jun 2014 )

English | 2013 | ISBN: 1622750349 | 80 pages | PDF | 12,7 MB Beginning with definitions of such basic terms as cryptanalysis, encryption, and decryption, this introduction from the Intelligence and Co...

( Category:Cryptography Date:04 Feb 2014 )

English | 2013 | ISBN: 1118188586 | 432 pages | PDF | 4,5 MB The only book to provide a unified view of the interplay between computational number theory and cryptography Computational number theory a...

( Category:Cryptography Date:05 Aug 2013 )

Publisher: Springer-Verlag | ISBN: 8847024809 | Release: 2012 | Italian | 517 Pages | PDF | 11.42 Mb L'analisi di sicurezza degli schemi crittografici, in passato, era spesso guidata dall'intuito e da...

( Category:Cryptography Date:13 Oct 2012 )

Publisher: Springer | ISBN: 8847003164 | Release: 1996 | Italian | 276 Pages | PDF | 12.65 Mb Durante la II guerra mondiale hanno avuto luogo numerosi risultati di rilievo nel campo della crittografia...

( Category:Cryptography Date:11 Apr 2012 )

**Categories**

Astronomy and Cosmology | Physics |

Philosophy | Medicine |

Mathematics | DSP |

Cryptography |
Chemistry |

Biology and Genetics | Psychology and Behavior |

**Popular ebooks**

Hacking Exposed Wireless, Third Edition: W(2041)

Cryptography: A Very Short Introduction(1563)

Codes, Cryptology and Curves with Computer(1501)

Serious Cryptography: A Practical Introduc(1075)

Bitcoin: Free Money or Fraud?(1059)

A Course in Number Theory and Cryptography(1031)

Applied Cryptography: Protocols, Algorithm(872)

Cryptography Demystified(755)

Online Danger: How to Protect Yourself and(701)

Achieving and Sustaining Secured Business (586)

Codes, Cryptology, and Information Securit(492)

Cryptographic Hardware and Embedded System(488)

Atlas of Diffuse Lung Diseases: A Multidis(472)

A Material History of Medieval and Early M(436)

Fault Diagnosis and Tolerance in Cryptogra(391)

Manual of Spine Surgery(380)

Theory of Cryptography(379)

Information Security and Cryptology: 12th (303)

Intelligence and Security Informatics(198)