Linked e-resources
Details
Table of Contents
Symmetric ciphers
Public-key cryptosystems
Signature and authentication
Homomorphic encryption.-Leakage-resilient
Post-quantum cryptography
Commitment and protocol
Elliptic curves
Security and implementation.
Public-key cryptosystems
Signature and authentication
Homomorphic encryption.-Leakage-resilient
Post-quantum cryptography
Commitment and protocol
Elliptic curves
Security and implementation.