#
Cryptography
Resource Information
The concept ** Cryptography** represents the subject, aboutness, idea or notion of resources found in **University of Liverpool**.

The Resource
Cryptography
Resource Information

The concept

**Cryptography**represents the subject, aboutness, idea or notion of resources found in**University of Liverpool**.- Label
- Cryptography

## Context

Context of Cryptography#### Subject of

No resources found

No enriched resources found

- 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)
- 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)
- A classical introduction to cryptography : applications for communications security
- A course in number theory and cryptography
- Achieving higher-fidelity conjunction analyses using cryptography to improve information sharing
- Advanced DPA theory and practice : towards the security limits of secure embedded circuits
- Advanced linear cryptanalysis of block and stream ciphers
- Advanced statistical steganalysis
- Algebraic cryptanalysis
- Algebraic geometry in coding theory and cryptography
- Algebraic geometry modeling in information theory
- Application security principles.
- Applied cryptanalysis : breaking ciphers in the real world
- Applied cryptography : protocols, algorithms, and source code in C
- Applied quantum cryptography
- Basics of contemporary cryptography for IT practitioners
- Beginning cryptography with Java
- Bent functions : results and applications to cryptography
- Boolean functions and their applications in cryptography
- Broadband quantum cryptography
- Candidate multilinear maps
- Chaos-based cryptography : theory, algorithms and applications
- Codebreakers' Victory : How the Allied Cryptographers Won World War II
- Codes : an introduction to information communication and cryptography
- Codes and ciphers : Julius Caesar, the Enigma, and the internet
- Codes and ciphers : Julius Caesar, the Enigma, and the internet
- Codes and cryptography
- Coding and cryptography : synergy for a robust communication
- Coding for data and computer communications
- Complexity and cryptography : an introduction
- Contemporary cryptography
- Contemporary cryptography
- Contemporary cryptology : the science of information integrity
- Cryptographic Boolean functions and applications
- Cryptographic Boolean functions and applications
- Cryptography
- Cryptography : a very short introduction
- Cryptography : protocols, design and applications
- Cryptography : theory and practice
- Cryptography and secure communication
- Cryptography for developers
- Cryptography in C and C++, second edition
- Cryptography made simple
- Cryptography's role in securing the information society
- Cryptography: a primer
- Cryptography: an introduction to computer security
- Cryptology : an introduction to the art and science of enciphering, encrypting, concealing, hiding, and safeguarding described without any arcane skullduggery but not without cunning waggery for the delectation and instruction of the general public
- Cybercryptography : applicable cryptography for cyberspace security
- Digital Fingerprinting
- Disappearing cryptography : information hiding : steganography & watermarking
- Dynamic secrets in communication security
- Efficient secure two-party protocols : techniques and constructions
- Elementary number Theory, cryptography and codes
- Elementary number Theory, cryptography and codes
- Elliptic curves : number theory and cryptography
- Elliptic curves in cryptography
- Elliptic curves in cryptography
- Enhancing information security and privacy by combining biometrics with cryptography
- Everyday cryptography : fundamental principles and applications
- Expert SQL server 2008 encryption
- Feistel ciphers : security proofs and cryptanalysis
- Finite automata and application to cryptography
- Group-based cryptography
- GrÃ¶bner bases, coding, and cryptography
- Guide to pairing-based cryptography
- Hashing in computer science : fifty years of slicing and dicing
- IBM eserver zSeries 990 (z990) cryptography implementation
- Information technology and applied mathematics : ICITAM 2017
- Initial Coin Offering (ICO) : Unternehmensfinanzierung auf Basis der Blockchain-Technologie
- Intelligent multimedia data hiding : new directions
- Intelligent watermarking techniques
- Introduction to cryptography : principles and applications
- Introduction to cryptography : principles and applications
- Introduction to cryptography with Maple
- Introduction to cryptology
- Introduction to security reduction
- Investigator's guide to steganography
- Java cryptography extensions : practical guide for programmers
- Lai-Massey cipher designs : history, design criteria and cryptanalysis
- Mathematical recreations & essays
- Modern cryptology: a tutorial
- Networked RFID systems and lightweight cryptography : raising barriers to product counterfeiting
- New directions of modern cryptography
- Online information review., Volume 31, Number 5, Issues in online security
- Personal encryption clearly explained
- Philosophical explorations of the legacy of AlanTuring : Turing 100
- Physics and theoretical computer science : from numbers and languages to (quantum) cryptography security
- Post-quantum cryptography
- Practical signcryption
- Primality testing and integer factorization in public-key cryptography
- Progress in applications of Boolean functions
- Progress in cryptology - Africacrypt 2010 : third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. proceedings
- Public-key cryptography
- Quantum cryptography : potentially perfect security
- Quantum cryptography and computing : theory and implementation
- Quantum cryptography and secret-key distillation
- Quantum information, computation and cryptography : an introductory survey of theory, technology and experiments
- Quantum private communication
- RSA Security's official guide to cryptography
- Real Life Cryptology
- Secret language
- Secret language
- Secure multi-party computation
- Security : secrets, intruders and ID tags
- Steganography Techniques for Digital Images
- Symmetric cryptographic protocols
- The block cipher companion
- The nature and power of mathematics
- The price-codes of the book-trade : a preliminary guide
- Topics in geometry, coding theory and cryptography
- Understanding cryptography : a textbook for students and practitioners
- Visual cryptography for image processing and security : theory, methods, and applications
- Web application obfuscation : -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)-
- [The code book : the secret history of codes and code-breaking
- zSeries Trusted Key Entry (TKE) version 4.2 update
- zSeries crypto guide update

## Embed

### Settings

Select options that apply then copy and paste the RDF/HTML data fragment to include in your application

Embed this data in a secure (HTTPS) page:

Layout options:

Include data citation:

<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/h3jDwrnUWjg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/h3jDwrnUWjg/">Cryptography</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>

Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements

### Preview

## Cite Data - Experimental

### Data Citation of the Concept Cryptography

Copy and paste the following RDF/HTML data fragment to cite this resource

`<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/h3jDwrnUWjg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/h3jDwrnUWjg/">Cryptography</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>`