default search action
Information Security and Cryptography
2022
- Laurent Chuat, Markus Legner, David A. Basin, David Hausheer, Samuel Hitz, Peter Müller, Adrian Perrig:
The Complete Guide to SCION - From Design Principles to Formal Verification. Information Security and Cryptography, Springer 2022, ISBN 978-3-031-05287-3 - Jörg Schwenk:
Guide to Internet Cryptography - Security Protocols and Real-World Attack Implications. Information Security and Cryptography, Springer 2022, ISBN 978-3-031-19438-2, pp. 1-523
2021
- Arno Mittelbach, Marc Fischlin:
The Theory of Hash Functions and Random Oracles - An Approach to Modern Cryptography. Information Security and Cryptography, Springer 2021, ISBN 978-3-030-63286-1, pp. 1-778 - Yan Lin:
Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity. Information Security and Cryptography, Springer 2021, ISBN 978-3-030-73140-3, pp. 1-95 - Paul C. van Oorschot:
Computer Security and the Internet - Tools and Jewels from Malware to Bitcoin, Second Edition. Information Security and Cryptography, Springer 2021, ISBN 978-3-030-83410-4, pp. 1-409
2020
- Colin Boyd, Anish Mathuria, Douglas Stebila:
Protocols for Authentication and Key Establishment, Second Edition. Information Security and Cryptography, Springer 2020, ISBN 978-3-662-58145-2, pp. 1-440 - Paul C. van Oorschot:
Computer Security and the Internet - Tools and Jewels. Information Security and Cryptography, Springer 2020, ISBN 978-3-030-33648-6, pp. 1-338 - Joan Daemen, Vincent Rijmen:
The Design of Rijndael - The Advanced Encryption Standard (AES), Second Edition. Information Security and Cryptography, Springer 2020, ISBN 978-3-662-60768-8, pp. 1-247 - Mário S. Alvim, Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith:
The Science of Quantitative Information Flow. Information Security and Cryptography, Springer 2020, ISBN 978-3-319-96129-3, pp. I-XXVIII, 1-478
2018
- Rosario Giustolisi:
Modelling and Verification of Secure Exams. Information Security and Cryptography, Springer 2018, ISBN 978-3-319-67106-2, pp. 1-123
2017
- Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk, Laurent Chuat:
SCION: A Secure Internet Architecture. Information Security and Cryptography, Springer 2017, ISBN 978-3-319-67079-9, pp. 3-386
2016
- Joel Reardon:
Secure Data Deletion. Information Security and Cryptography, Springer 2016, ISBN 978-3-319-28777-5, pp. 3-186 - Nigel P. Smart:
Cryptography Made Simple. Information Security and Cryptography, Springer 2016, ISBN 978-3-319-21935-6, pp. 3-450
2015
- Hans Delfs, Helmut Knebl:
Introduction to Cryptography - Principles and Applications, Third Edition. Information Security and Cryptography, Springer 2015, ISBN 978-3-662-47973-5, pp. 1-396
2014
- Benny Applebaum:
Cryptography in Constant Parallel Time. Information Security and Cryptography, Springer 2014, ISBN 978-3-642-17366-0, pp. 1-185 - Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan, Luca Henzen:
The Hash Function BLAKE. Information Security and Cryptography, Springer 2014, ISBN 978-3-662-44756-7, pp. 1-185
2012
- Cas Cremers, Sjouke Mauw:
Operational Semantics and Verification of Security Protocols. Information Security and Cryptography, Springer 2012, ISBN 978-3-540-78636-8, pp. 1-155 - Marc Joye, Michael Tunstall:
Fault Analysis in Cryptography. Information Security and Cryptography, Springer 2012, ISBN 978-3-642-29655-0 [contents]
2011
- Lars R. Knudsen, Matthew Robshaw:
The Block Cipher Companion. Information Security and Cryptography, Springer 2011, ISBN 978-3-642-17341-7, pp. I-XIV, 1-267
2010
- Rainer Böhme:
Advanced Statistical Steganalysis. Information Security and Cryptography, Springer 2010, ISBN 978-3-642-14312-0, pp. 1-217 - Carmit Hazay, Yehuda Lindell:
Efficient Secure Two-Party Protocols - Techniques and Constructions. Information Security and Cryptography, Springer 2010, ISBN 978-3-642-14302-1, pp. 3-254 - Sergey Yekhanin:
Locally Decodable Codes and Private Information Retrieval Schemes. Information Security and Cryptography, Springer 2010, ISBN 978-3-642-14357-1, pp. 1-74 - Ahmad-Reza Sadeghi, David Naccache:
Towards Hardware-Intrinsic Security - Foundations and Practice. Information Security and Cryptography, Springer 2010, ISBN 978-3-642-14451-6 [contents] - Phong Q. Nguyen, Brigitte Vallée:
The LLL Algorithm - Survey and Applications. Information Security and Cryptography, Springer 2010, ISBN 978-3-642-02294-4 [contents] - Alexander W. Dent, Yuliang Zheng:
Practical Signcryption. Information Security and Cryptography, Springer 2010, ISBN 978-3-540-89409-4 [contents]
2007
- Giampaolo Bella:
Formal Correctness of Security Protocols - With 62 Figures and 4 Tables. Information Security and Cryptography, Springer 2007, ISBN 978-3-540-68134-2, pp. 1-234 - Hans Delfs, Helmut Knebl:
Introduction to Cryptography - Principles and Applications, Second Edition. Information Security and Cryptography, Springer 2007, ISBN 978-3-540-49243-6, pp. 1-287
2006
- Alon Rosen:
Concurrent Zero-Knowledge - With Additional Background by Oded Goldreich. Information Security and Cryptography, Springer 2006, ISBN 978-3-540-32938-1, pp. I-XIII, 1-184
2003
- Colin Boyd, Anish Mathuria:
Protocols for Authentication and Key Establishment. Information Security and Cryptography, Springer 2003, ISBN 978-3-642-07716-6, pp. I-XXIV, 1-323
2002
- Joan Daemen, Vincent Rijmen:
The Design of Rijndael: AES - The Advanced Encryption Standard. Information Security and Cryptography, Springer 2002, ISBN 3-540-42580-2 - Hans Delfs, Helmut Knebl:
Introduction to Cryptography - Principles and Applications. Information Security and Cryptography, Springer 2002, ISBN 3-540-42278-1
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.