Information Security and Cryptography
2012
Cas Cremers, Sjouke Mauw: Operational Semantics and Verification of Security Protocols. Springer 2012 Information Security and Cryptography ISBN 978-3-540-78636-8, pp. 1-155 [ contents ]
Marc Joye, Michael Tunstall (Eds.): Fault Analysis in Cryptography. Springer 2012 Information Security and Cryptography ISBN 978-3-642-29655-0 [ contents ]
2011
Lars R. Knudsen, Matthew Robshaw: The Block Cipher Companion. Springer 2011 Information Security and Cryptography ISBN 978-3-642-17341-7, pp. I-XIV, 1-267 [ contents ]
2010
Rainer Böhme: Advanced Statistical Steganalysis. Springer 2010 Information Security and Cryptography ISBN 978-3-642-14312-0, pp. 1-217 [ contents ]
Carmit Hazay, Yehuda Lindell: Efficient Secure Two-Party Protocols - Techniques and Constructions. Springer 2010 Information Security and Cryptography ISBN 978-3-642-14302-1, pp. 3-254 [ contents ]
Sergey Yekhanin: Locally Decodable Codes and Private Information Retrieval Schemes. Springer 2010 Information Security and Cryptography ISBN 978-3-642-14357-1, pp. 1-74 [ contents ]
Ahmad-Reza Sadeghi, David Naccache (Eds.): Towards Hardware-Intrinsic Security - Foundations and Practice. Springer 2010 Information Security and Cryptography ISBN 978-3-642-14451-6 [ contents ]
Phong Q. Nguyen, Brigitte Vallée (Eds.): The LLL Algorithm - Survey and Applications. Springer 2010 Information Security and Cryptography ISBN 978-3-642-02294-4 [ contents ]
Alexander W. Dent, Yuliang Zheng (Eds.): Practical Signcryption. Springer 2010 Information Security and Cryptography ISBN 978-3-540-89409-4 [ contents ]
2007
Giampaolo Bella: Formal Correctness of Security Protocols - With 62 Figures and 4 Tables. Springer 2007 Information Security and Cryptography ISBN 978-3-540-68134-2, pp. 1-234 [ contents ]
Hans Delfs, Helmut Knebl: Introduction to Cryptography - Principles and Applications. Springer 2007 Information Security and Cryptography ISBN 978-3-540-49243-6, pp. 1-287 [ contents ]
2006
Alon Rosen: Concurrent Zero-Knowledge - With Additional Background by Oded Goldreich. Springer 2006 Information Security and Cryptography ISBN 978-3-540-32938-1, pp. I-XIII, 1-184 [ contents ]
2003
Colin Boyd, Anish Mathuria: Protocols for Authentication and Key Establishment. Springer 2003 Information Security and Cryptography ISBN 978-3-642-07716-6, pp. I-XXIV, 1-323 [ contents ]
2002
Joan Daemen, Vincent Rijmen: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer 2002 Information Security and Cryptography ISBN 3-540-42580-2 [ contents ]
Hans Delfs, Helmut Knebl: Introduction to Cryptography: Principles and Applications. Springer 2002 Information Security and Cryptography ISBN 3-540-42278-1 [ contents ]



