Technique
History
Math
Linguistics
Computers
Social Sciences
Psychology
Free Cryptography Books
Advances in Cryptology – EUROCRYPT 2011: 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings
Information Security, Coding Theory and Related Combinatorics: Information Coding and Combinatorics - Volume 29 NATO Science for Peace and Security Series
Cryptography Engineering: Design Principles and Practical Applications
Public Key Cryptography – PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings
Cryptographic Hardware and Embedded Systems - CHES 2003: 5th International Workshop, Cologne, Germany, September 8–10, 2003. Proceedings
Теоретико-числовые методы в криптографии
Complexity Theory and Cryptology. An Introduction to Cryptocomplexity
Caliban's Problem Book: Mathematical, Inferential and Cryptographic Puzzles
Modern Cryptology: A Tutorial
Поточные шифры
Codes and Cryptography
Information Hiding Techniques for Steganography and Digital Watermarking
Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop Redwood Shores, CA, USA, August 13–15, 2002 Revised Papers
Fast Software Encryption: 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers
Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings
Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings
Foundations of Cryptography: Volume 2, Basic Applications
Introduction to Modern Cryptography: Principles and Protocols
Advances in Cryptology – CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings
Digital Watermarking: 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers
New Stream Cipher Designs: The eSTREAM Finalists
Secret Language: Codes, Tricks, Spies, Thieves, and Symbols
Handbook of financial cryptography and security
Algebraic Geometry in Coding Theory and Cryptography
Public-Key Cryptography
Contemporary Cryptology (Advanced Courses in Mathematics - CRM Barcelona)
BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic
Public Key Cryptography - PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010, Proceedings ... Computer Science Security and Cryptology)
Visuelle Kryptographie
Cryptography and Security Services: Mechanisms and Applications
Introduction to Cryptography
Cryptographic Algorithms on Reconfigurable Hardware
Элементы криптологии
Основы современной криптографии: Учебное пособие
Совершенные шифры
Теория помехоустойчивого кодирования: Методические указания
Основы криптоанализа симметричных шифров: Учебное пособие
Методы и задачи криптографической защиты информации: Учебное пособие
Квантовая криптография: принципы, протоколы, системы
Алгоритм RSA: Методические указания к выполнению лабораторных работ
Применение эллиптических кривых в криптографии: Методические указания к выполнению лабораторных работ
Криптоанализ классических шифров: Лабораторный практикум
Методы и средства криптографической защиты информации: Учебное пособие
Элементы теории чисел и криптозащита: Учебное пособие для вузов. Часть 2
Криптографические протоколы: Рабочая программа дисциплины
Поточные шифры. Результаты зарубежной открытой криптологии
Лекции по арифметическим вопросам криптографии
Теоретико-числовые методы в криптографии
Information Security and Cryptology: First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings
Codes, Ciphers, and Secret Languages
Practical Cryptology & Web Security
Elementary Number Theory, Cryptography and Codes
Cryptography: Theory and Practice
Cryptography Demystified
Advances in Cryptology — ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security Queenstown, New Zealand, December 1–5, 2002 Proceedings
Cryptanalysis of RSA and Its Variants
Introduction to Cyclotomic Fields
A Course in Number Theory and Cryptography
Elliptic Curves: Number Theory and Cryptography
Contemporary Cryptology
Coding Theory and Cryptology
Boolean Functions in Cryptology and Information Security
Algebraic Aspects of Cryptography: With an Appendix on Hyperelliptic Curves
Einführung in die Kryptographie
Einführung in die Kryptographie (Springer-Lehrbuch)
Кpиптогpафия от папиpуса до компьютеpа
Криптография без секретов
Книга шифров. Тайная история шифров и их расшифровки
Практическая криптография. Алгоритмы и их программирование
Cryptography and Lattices: International Conference, CaLC 2001 Providence, RI, USA, March 29–30, 2001 Revised Papers
Advances in Cryptology – ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings
Теоретическая криптография
Системы поточного шифрования
Системы блочного шифрования
Криптография
Основы криптологии. Профессиональное руководство и интерактивный учебник (CD-ROM приложение)
Прикладная криптография
Основы современной криптографии
Ханаанский бальзам
Cryptography and Security Services: Mechanisms and Applications
Cryptology Unlocked
Криптографическая защита информации
Abenteuer Kryptologie
Modern Cryptography: Theory and Practice
Криптография на Си и С++ в действии
Foundations of Cryptography: Volume 1, Basic Tools (Vol 1)
Cryptography for Developers
Современная криптография: теория и практика
Kryptologie: Algebraische Methoden und Algorithmen
Einfuhrung in die Kryptologie: Lehrbuch fur Unterricht und Selststudium
Codes over Rings: Proceedings of the Cimpa Summer School, Ankara, Turkey, 18-29 August 2008 (Series on Coding Theory and Cryptology)
Algebraic Cryptanalysis
Basics of Contemporary Cryptography for IT Practitioners
Post-Quantum Cryptography
Cryptanalysis
Mechanics of User Identification and Authentication: Fundamentals of Identity Management
Identity-Based Cryptography
Codes: An Introduction to Information Communication and Cryptography
Einführung in die Kryptographie
1
2
3
4
...
Go to Page
GO
Technique
History
Math
Linguistics
Computers
Social Sciences
Psychology