#
Cryptography
Resource Information
The concept ** Cryptography** represents the subject, aboutness, idea or notion of resources found in **Sydney Jones Library, University of Liverpool**.

The Resource
Cryptography
Resource Information

The concept

**Cryptography**represents the subject, aboutness, idea or notion of resources found in**Sydney Jones Library, University of Liverpool**.- Label
- Cryptography

## Context

Context of Cryptography#### Subject of

No resources found

No enriched resources found

- 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)
- 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)
- A classical introduction to cryptography : applications for communications security
- A course in number theory and cryptography
- A course in number theory and cryptography
- A discovery of a new world, or, A discourse tending to prove, that 'tis probable there may be another habitable world in the moon : with a discourse concerning the probability of a passage thither : unto which is added, A discourse concerning a new planet, tending to prove, that 'tis probable our Earth is one of the planets : in two parts
- Achieving higher-fidelity conjunction analyses using cryptography to improve information sharing
- Advanced DPA theory and practice : towards the security limits of secure embedded circuits
- Advanced linear cryptanalysis of block and stream ciphers
- Advanced statistical steganalysis
- Algebraic cryptanalysis
- Algebraic geometry in coding theory and cryptography
- Algebraic geometry in coding theory and cryptography
- Algebraic geometry modeling in information theory
- Applied cryptanalysis : breaking ciphers in the real world
- Applied cryptography : protocols, algorithms, and source code in C
- Applied cryptography : protocols, algorithms, and source code in C
- Applied cryptography : protocols, algorithms, and source code in C
- Applied cryptography : protocols, algorithms, and source code in C
- Applied cryptography : protocols, algorithms, and source code in C
- Applied quantum cryptography
- Authentication Technologies for Cloud Computing, IoT and Big Data
- Basics of contemporary cryptography for IT practitioners
- Beginning cryptography with Java
- Bent functions : results and applications to cryptography
- Blockchain and Machine Learning for e-Healthcare Systems
- Blockchains for Network Security : Principles, technologies and applications
- Boolean functions and their applications in cryptography
- Boolean functions for cryptography and coding theory
- Broadband quantum cryptography
- Candidate multilinear maps
- Chaos-based cryptography : theory, algorithms and applications
- Codebreakers' Victory : How the Allied Cryptographers Won World War II
- Codes : an introduction to information communication and cryptography
- Codes and ciphers : Julius Caesar, the Enigma, and the internet
- Codes and ciphers : Julius Caesar, the Enigma, and the internet
- Codes and cryptography
- Coding and cryptography : synergy for a robust communication
- Coding for data and computer communications
- Complexity and cryptography : an introduction
- Computational cryptography : algorithmic aspects of cryptology
- Computer security and cryptography
- Contemporary cryptography
- Contemporary cryptography
- Contemporary cryptology : the science of information integrity
- Cracking codes & cryptograms for dummies
- Crypto : how the code rebels beat the government, saving privacy in the digital age
- Cryptographic Boolean functions and applications
- Cryptographic Boolean functions and applications
- Cryptographic Security Architecture : Design and Verification
- Cryptography
- Cryptography
- Cryptography : Infosec pro guide
- Cryptography : a very short introduction
- Cryptography : protocols, design and applications
- Cryptography : theory and practice
- Cryptography and network security
- Cryptography and secure communication
- Cryptography for developers
- Cryptography in C and C++
- Cryptography in C and C++, second edition
- Cryptography made simple
- Cryptography's role in securing the information society
- Cryptography: a primer
- Cryptography: an introduction to computer security
- Cryptology : an introduction to the art and science of enciphering, encrypting, concealing, hiding, and safeguarding described without any arcane skullduggery but not without cunning waggery for the delectation and instruction of the general public
- Cryptomenysis patefacta, or, The art of secret information disclosed without a key : containing, plain and demonstrative rules, for decyphering all manner of secret writing with exact methods, for resolving secret intimations by signs or gestures, or in speech : as also an inquiry into the secret ways of conveying written messages, and the several mysterious proposals for secret information, mentioned by Trithemius, &c.
- Cybercryptography : applicable cryptography for cyberspace security
- Decentralized applications : harnessing Bitcoin's blockchain technology
- Digital Fingerprinting
- Disappearing cryptography : information hiding : steganography & watermarking
- Disappearing cryptography : information hiding : steganography & watermarking
- Disappearing cryptography : information hiding : steganography & watermarking
- Disappearing cryptography : information hiding : steganography & watermarking
- Disappearing cryptography : information hiding, steganography & watermarking
- Dynamic secrets in communication security
- Efficient secure two-party protocols : techniques and constructions
- Elementary number Theory, cryptography and codes
- Elliptic curves : number theory and cryptography
- Elliptic curves : number theory and cryptography
- Elliptic curves : number theory and cryptography
- Elliptic curves in cryptography
- Elliptic curves in cryptography
- Energy Systems for Electric and Hybrid Vehicles
- Enhancing information security and privacy by combining biometrics with cryptography
- Everyday cryptography : fundamental principles and applications
- Expert SQL server 2008 encryption
- Feistel ciphers : security proofs and cryptanalysis
- Finite automata and application to cryptography
- Frontiers in Securing IP Cores : Forensic detective control and obfuscation techniques
- Group theoretic cryptography
- Group theoretic cryptography
- Group-based cryptography
- Gröbner bases, coding, and cryptography
- Guide to pairing-based cryptography
- Hacking the hacker : learn from the experts who take down hackers
- Hashing in computer science : fifty years of slicing and dicing
- Hiding behind the keyboard : uncovering covert communication methods with forensic analysis
- Hiding behind the keyboard : uncovering covert communication methods with forensic analysis
- IBM eserver zSeries 990 (z990) cryptography implementation
- Information and Communication Technologies for Humanitarian Services
- Information technology and applied mathematics : ICITAM 2017
- Information theory : coding and cryptography
- Initial Coin Offering (ICO) : Unternehmensfinanzierung auf Basis der Blockchain-Technologie
- Intelligent multimedia data hiding : new directions
- Intelligent watermarking techniques
- Introduction to cryptography : principles and applications
- Introduction to cryptography : principles and applications
- Introduction to cryptography with Maple
- Introduction to cryptology
- Introduction to security reduction
- Investigator's guide to steganography
- Java cryptography
- Java cryptography
- Java cryptography extensions : practical guide for programmers
- Kryptografie : verfahren, protokolle, infrastrukturen
- Lai-Massey cipher designs : history, design criteria and cryptanalysis
- Lectures on Data Security : Modern Cryptology in Theory and Practice
- Malicious cryptography : exposing cryptovirology
- Malicious cryptography : exposing cryptovirology
- Mathematical recreations & essays
- Modern cryptanalysis : techniques for advanced code breaking
- Modern cryptanalysis : techniques for advanced code breaking
- Modern cryptology: a tutorial
- Networked RFID systems and lightweight cryptography : raising barriers to product counterfeiting
- New directions of modern cryptography
- Online information review., Volume 31, Number 5, Issues in online security
- Optical cryptosystems
- Personal encryption clearly explained
- Philosophical explorations of the legacy of AlanTuring : Turing 100
- Physics and theoretical computer science : from numbers and languages to (quantum) cryptography security
- Post-quantum cryptography
- Practical signcryption
- Primality testing and integer factorization in public-key cryptography
- Progress in applications of Boolean functions
- Progress in cryptology - Africacrypt 2010 : third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. proceedings
- Public-key cryptography
- Quantum computing : progress and prospects
- Quantum cryptography : potentially perfect security
- Quantum cryptography and computing : theory and implementation
- Quantum cryptography and secret-key distillation
- Quantum information, computation and cryptography : an introductory survey of theory, technology and experiments
- Quantum private communication
- RSA Security's official guide to cryptography
- Rarities, or, The incomparable curiosities in secret writing, both aswel [i.e. as well as] by waters as cyphers, explained and made familiar to the meanest capacity : by which ministers of state may manage the intrigues of court and grand concerns of princes, the ladies communicate their amours, and every ordinary person (onely capable of legible writing) may order his private affairs with all imaginable safety and secrecy ...
- Real Life Cryptology
- Secret language
- Secure multi-party computation
- Secured Hardware Accelerators for DSP and Image Processing Applications
- Security : secrets, intruders and ID tags
- Security and Privacy for Big Data, Cloud Computing and Applications
- Selected Areas in Cryptography : 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001 Revised Papers
- State of the Art in Applied Cryptography : Course on Computer Security and Industrial Cryptography Leuven, Belgium, June 3-6, 1997 Revised Lectures
- Steganography Techniques for Digital Images
- Stenographie and crytographie, or, The arts of short and secret writing : the first laid down in a method familiar to meane capacities, the second added to convince and cautionate the credulous and the confident, and to exercise and humour the ingenious and their fancies
- Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection
- Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection
- Symmetric cryptographic protocols
- The block cipher companion
- The mathematical and philosophical works of the Right Rev. John Wilkins
- The modelling and analysis of security protocols : the CSP approach
- The nature and power of mathematics
- The official PGP user's guide
- The price-codes of the book-trade : a preliminary guide
- Topics in geometry, coding theory and cryptography
- Understanding cryptography : a textbook for students and practitioners
- United States Diplomatic Codes and Ciphers, 1775-1938
- Visual cryptography for image processing and security : theory, methods, and applications
- Web application obfuscation : '-/WAFs.evasion.filters//alert (/obfuscation/)-'
- Web application obfuscation : -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)-
- Web application obfuscation : -/WAFs..Evasion..Filters//alert (/Obfuscation/)-
- [The code book : the secret history of codes and code-breaking
- zSeries Trusted Key Entry (TKE) version 4.2 update
- zSeries crypto guide update
- Übersicht über die nichtdiplomatischen Geheimschriften des Kittelalters

## Embed

### Settings

Select options that apply then copy and paste the RDF/HTML data fragment to include in your application

Embed this data in a secure (HTTPS) page:

Layout options:

Include data citation:

<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/h3jDwrnUWjg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/h3jDwrnUWjg/">Cryptography</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">Sydney Jones Library, University of Liverpool</a></span></span></span></span></div>

Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements

### Preview

## Cite Data - Experimental

### Data Citation of the Concept Cryptography

Copy and paste the following RDF/HTML data fragment to cite this resource

`<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/h3jDwrnUWjg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/h3jDwrnUWjg/">Cryptography</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">Sydney Jones Library, University of Liverpool</a></span></span></span></span></div>`