Loading...
Please wait, while we are loading the content...
Similar Documents
Efficient Secure Two-Party Protocols : Techniques and Constructions by Carmit
| Content Provider | Semantic Scholar |
|---|---|
| Author | Pless, Vera Peters, Allison Kathleen |
| Copyright Year | 2015 |
| Abstract | 4. Understanding and Applying Cryptography and Data Security by Adam J. Elbirt Review by Jérémy Barbay. This book describes cryptographical mechanisms and some of the mathematical concept required to understand them, from a very technical point of view, with a particular emphasis on the techniques of efficient implementation in hardware and software, as well as on the attacks that have been proposed in recent publications. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | https://oxca.pw/945-id.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |