#
Cryptography
Resource Information
The concept ** Cryptography** represents the subject, aboutness, idea or notion of resources found in **University of Liverpool**.

The Resource
Cryptography
Resource Information

The concept

**Cryptography**represents the subject, aboutness, idea or notion of resources found in**University of Liverpool**.- Label
- Cryptography

## Context

Context of Cryptography#### Subject of

No resources found

No enriched resources found

- 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)
- 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)
- A classical introduction to cryptography : applications for communications security
- A course in number theory and cryptography
- A discovery of a new world, or, A discourse tending to prove, that 'tis probable there may be another habitable world in the moon : with a discourse concerning the probability of a passage thither : unto which is added, A discourse concerning a new planet, tending to prove, that 'tis probable our Earth is one of the planets : in two parts
- Achieving higher-fidelity conjunction analyses using cryptography to improve information sharing
- Advanced DPA theory and practice : towards the security limits of secure embedded circuits
- Advanced linear cryptanalysis of block and stream ciphers
- Advanced statistical steganalysis
- Algebraic cryptanalysis
- Algebraic geometry in coding theory and cryptography
- Algebraic geometry modeling in information theory
- Application security principles.
- Applied cryptanalysis : breaking ciphers in the real world
- Applied cryptography : protocols, algorithms, and source code in C
- Applied quantum cryptography
- Basics of contemporary cryptography for IT practitioners
- Beginning cryptography with Java
- Bent functions : results and applications to cryptography
- Boolean functions and their applications in cryptography
- Broadband quantum cryptography
- Candidate multilinear maps
- Chaos-based cryptography : theory, algorithms and applications
- Codebreakers' Victory : How the Allied Cryptographers Won World War II
- Codes : an introduction to information communication and cryptography
- Codes and ciphers : Julius Caesar, the Enigma, and the internet
- Codes and cryptography
- Coding and cryptography : synergy for a robust communication
- Coding for data and computer communications
- Complexity and cryptography : an introduction
- Contemporary cryptography
- Contemporary cryptography
- Contemporary cryptology : the science of information integrity
- Cryptographic Boolean functions and applications
- Cryptographic Boolean functions and applications
- Cryptographic Security Architecture : Design and Verification
- Cryptography
- Cryptography
- Cryptography : a very short introduction
- Cryptography : protocols, design and applications
- Cryptography : theory and practice
- Cryptography for developers
- Cryptography in C and C++, second edition
- Cryptography made simple
- Cryptography's role in securing the information society
- Cryptography: a primer
- Cryptography: an introduction to computer security
- Cryptology : an introduction to the art and science of enciphering, encrypting, concealing, hiding, and safeguarding described without any arcane skullduggery but not without cunning waggery for the delectation and instruction of the general public
- Cryptomenysis patefacta, or, The art of secret information disclosed without a key : containing, plain and demonstrative rules, for decyphering all manner of secret writing with exact methods, for resolving secret intimations by signs or gestures, or in speech : as also an inquiry into the secret ways of conveying written messages, and the several mysterious proposals for secret information, mentioned by Trithemius, &c.
- Cybercryptography : applicable cryptography for cyberspace security
- Digital Fingerprinting
- Disappearing cryptography : information hiding : steganography & watermarking
- Dynamic secrets in communication security
- Efficient secure two-party protocols : techniques and constructions
- Elementary number Theory, cryptography and codes
- Elliptic curves : number theory and cryptography
- Elliptic curves in cryptography
- Enhancing information security and privacy by combining biometrics with cryptography
- Everyday cryptography : fundamental principles and applications
- Expert SQL server 2008 encryption
- Feistel ciphers : security proofs and cryptanalysis
- Finite automata and application to cryptography
- Group-based cryptography
- Gröbner bases, coding, and cryptography
- Guide to pairing-based cryptography
- Hashing in computer science : fifty years of slicing and dicing
- IBM eserver zSeries 990 (z990) cryptography implementation
- Information technology and applied mathematics : ICITAM 2017
- Initial Coin Offering (ICO) : Unternehmensfinanzierung auf Basis der Blockchain-Technologie
- Intelligent multimedia data hiding : new directions
- Intelligent watermarking techniques
- Introduction to cryptography : principles and applications
- Introduction to cryptography : principles and applications
- Introduction to cryptography with Maple
- Introduction to cryptology
- Introduction to security reduction
- Investigator's guide to steganography
- Java cryptography extensions : practical guide for programmers
- Lai-Massey cipher designs : history, design criteria and cryptanalysis
- Lectures on Data Security : Modern Cryptology in Theory and Practice
- Mathematical recreations & essays
- Modern cryptology: a tutorial
- Networked RFID systems and lightweight cryptography : raising barriers to product counterfeiting
- New directions of modern cryptography
- Online information review., Volume 31, Number 5, Issues in online security
- Personal encryption clearly explained
- Philosophical explorations of the legacy of AlanTuring : Turing 100
- Physics and theoretical computer science : from numbers and languages to (quantum) cryptography security
- Post-quantum cryptography
- Practical signcryption
- Primality testing and integer factorization in public-key cryptography
- Progress in applications of Boolean functions
- Progress in cryptology - Africacrypt 2010 : third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. proceedings
- Public-key cryptography
- Quantum cryptography : potentially perfect security
- Quantum cryptography and computing : theory and implementation
- Quantum cryptography and secret-key distillation
- Quantum information, computation and cryptography : an introductory survey of theory, technology and experiments
- Quantum private communication
- RSA Security's official guide to cryptography
- Rarities, or, The incomparable curiosities in secret writing, both aswel [i.e. as well as] by waters as cyphers, explained and made familiar to the meanest capacity : by which ministers of state may manage the intrigues of court and grand concerns of princes, the ladies communicate their amours, and every ordinary person (onely capable of legible writing) may order his private affairs with all imaginable safety and secrecy ...
- Real Life Cryptology
- Secret language
- Secure multi-party computation
- Security : secrets, intruders and ID tags
- Selected Areas in Cryptography : 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001 Revised Papers
- State of the Art in Applied Cryptography : Course on Computer Security and Industrial Cryptography Leuven, Belgium, June 3-6, 1997 Revised Lectures
- Steganography Techniques for Digital Images
- Stenographie and crytographie, or, The arts of short and secret writing : the first laid down in a method familiar to meane capacities, the second added to convince and cautionate the credulous and the confident, and to exercise and humour the ingenious and their fancies
- Symmetric cryptographic protocols
- The block cipher companion
- The nature and power of mathematics
- The official PGP user's guide
- The price-codes of the book-trade : a preliminary guide
- Topics in geometry, coding theory and cryptography
- Understanding cryptography : a textbook for students and practitioners
- Visual cryptography for image processing and security : theory, methods, and applications
- Web application obfuscation : -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)-
- [The code book : the secret history of codes and code-breaking
- zSeries Trusted Key Entry (TKE) version 4.2 update
- zSeries crypto guide update
- Übersicht über die nichtdiplomatischen Geheimschriften des Kittelalters

## Embed

### Settings

Select options that apply then copy and paste the RDF/HTML data fragment to include in your application

Embed this data in a secure (HTTPS) page:

Layout options:

Include data citation:

<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/h3jDwrnUWjg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/h3jDwrnUWjg/">Cryptography</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>

Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements

### Preview

## Cite Data - Experimental

### Data Citation of the Concept Cryptography

Copy and paste the following RDF/HTML data fragment to cite this resource

`<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/h3jDwrnUWjg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/h3jDwrnUWjg/">Cryptography</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>`