Cryptographic Protocols.- Side Channel Attacks and Tamper Resistance.- Digital Signatures.- Privacy Preserving Computation.- Multi-party Computation.- Symmetric Key Primitives.- Symmetric Key Primitives.- Symmetric Key Cryptanalysis.- Public Key Encryption.- Authentication and Biometrics.- Cloud and Peer-to-peer Security.
"synopsis" may belong to another edition of this title.
(No Available Copies)
Search Books: Create a WantCan't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!
Create a Want