Publisher: Elsevier

Related content
Volume 2, Number 2, 1997

< previous issue | all issues | next issue >

Favourites:Add to Favourites

Introduction
pp. 1-2(2)
Author: Hardy, G.

Favourites:Add to Favourites

Introduction to Cryptology
pp. 10-13(4)
Author: Piper, F.

Favourites:Add to Favourites

A Brief History of Cryptography
pp. 14-17(4)
Author: Davies, D.

Favourites:Add to Favourites

The Difficulty of Attacking Cryptosystems
pp. 18-21(4)
Author: Murphy, S.

Favourites:Add to Favourites

The Data Encryption Standard
pp. 22-24(3)
Authors: Coppersmith, D.; Holloway, C.; Matyas, S.M.

Favourites:Add to Favourites

Authentication Using Cryptography
pp. 25-32(8)
Author: Mitchell, C.

Favourites:Add to Favourites

MACs and Hash Functions: State of the Art
pp. 33-43(11)
Author: Preneel, B.

Favourites:Add to Favourites

The Management of Symmetric Keys
pp. 44-53(10)
Author: Halliden, P.

Favourites:Add to Favourites

Microsoft CryptoAPI
pp. 74-77(4)
Author: Fuchsberger, A.

Favourites:Add to Favourites

Quantum Cryptography: Protecting our Future Networks with Quantum Mechanics
pp. 88-97(10)
Authors: Phoenix, S.J.D.; Townsend, P.D.

Share Content

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
X
Cookie Policy
ingentaconnect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more