Coverage in this proceedings includes digital signature schemes, block cipher, key management, zero knowledge and secure computation protocols, secret sharing, stream cipher and pseudorandomness, system security and trusted computing, and network security.
Read More
Coverage in this proceedings includes digital signature schemes, block cipher, key management, zero knowledge and secure computation protocols, secret sharing, stream cipher and pseudorandomness, system security and trusted computing, and network security.
Read Less
Add this copy of Information Security and Cryptology: Third Sklois to cart. $3.99, very good condition, Sold by GuthrieBooks rated 4.0 out of 5 stars, ships from Spring Branch, TX, UNITED STATES, published 2008 by Springer.
Add this copy of Information Security and Cryptology: Third Sklois to cart. $32.22, good condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Hialeah, FL, UNITED STATES, published 2008 by Springer.
Add this copy of Information Security and Cryptology: Third Sklois to cart. $51.65, new condition, Sold by Ingram Customer Returns Center rated 5.0 out of 5 stars, ships from NV, USA, published 2008 by Springer.
Add this copy of Information Security and Cryptology: Third Sklois to cart. $62.34, new condition, Sold by booksXpress, ships from Bayonne, NJ, UNITED STATES, published 2008 by Springer.
Add this copy of Information Security and Cryptology: Third Sklois to cart. $97.20, new condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Hialeah, FL, UNITED STATES, published 2008 by Springer.