Linked e-resources
Details
Table of Contents
Cryptographic Protocols
Side Channel Attacks and Tamper Resistance
Digital Signatures
Privacy Preserving Computation
Multi-party Computation
Symmetric Key Primitives
Symmetric Key Primitives
Symmetric Key Cryptanalysis
Public Key Encryption
Authentication and Biometrics
Cloud and Peer-to-peer Security.
Side Channel Attacks and Tamper Resistance
Digital Signatures
Privacy Preserving Computation
Multi-party Computation
Symmetric Key Primitives
Symmetric Key Primitives
Symmetric Key Cryptanalysis
Public Key Encryption
Authentication and Biometrics
Cloud and Peer-to-peer Security.