Linked e-resources
Details
Table of Contents
Symmetric cryptanalysis
Public key cryptography
Identity-based encryption
Digital signatures
Security protocols
Privacy protocols
Symmetric constructions
Homomorphic encryption and obfuscation.
Public key cryptography
Identity-based encryption
Digital signatures
Security protocols
Privacy protocols
Symmetric constructions
Homomorphic encryption and obfuscation.