Secure Computing

1 Open Access Books

21 Authors and Editors

4 Web of Science Citations

7 Dimensions Citations

1 peer-reviewed open access book

Select

Most cited chapters in this category

Chapter titleDownloads
1. Construction of Orthogonal Arrays of Index Unity Using Logarithm Tables for Galois Fields

By Jose Torres-Jimenez, Himer Avila-George, Nelson Rangel-Valdez and Loreto Gonzalez-Hernandez

Part of book: Cryptography and Security in Computing

2911
2. Elliptic Curve Cryptography and Point Counting Algorithms

By Hailiza Kamarulhaili and Liew Khang Jie

Part of book: Cryptography and Security in Computing

4244
3. Malicious Cryptology and Mathematics

By Eric Filiol

Part of book: Cryptography and Security in Computing

2921

Most downloaded chapters in this category in last 30 days

Chapter title
1. Cryptographic Criteria on Vector Boolean Functions

By José Antonio Álvarez-Cubero and Pedro J. Zufiria

Part of book: Cryptography and Security in Computing

2. Potential Applications of IPsec in Next Generation Networks

By Cristina-Elena Vintilă

Part of book: Cryptography and Security in Computing

3. Elliptic Curve Cryptography and Point Counting Algorithms

By Hailiza Kamarulhaili and Liew Khang Jie

Part of book: Cryptography and Security in Computing

4. Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks

By Jaydip Sen

Part of book: Cryptography and Security in Computing

5. Construction of Orthogonal Arrays of Index Unity Using Logarithm Tables for Galois Fields

By Jose Torres-Jimenez, Himer Avila-George, Nelson Rangel-Valdez and Loreto Gonzalez-Hernandez

Part of book: Cryptography and Security in Computing

6. Scan-Based Side-Channel Attack on the RSA Cryptosystem

By Ryuta Nara, Masao Yanagisawa and Nozomu Togawa

Part of book: Cryptography and Security in Computing

7. PGP Protocol and Its Applications

By Hilal M. Yousif Al-Bayatti, Abdul Monem S. Rahma and Hala Bhjat Abdul Wahab

Part of book: Cryptography and Security in Computing

8. Comparative Analysis of Master-Key and Interpretative Key Management (IKM) Frameworks

By Saman Shojae Chaeikar, Azizah Bt Abdul Manaf and Mazdak Zamani

Part of book: Cryptography and Security in Computing

9. Malicious Cryptology and Mathematics

By Eric Filiol

Part of book: Cryptography and Security in Computing

10. Division and Inversion Over Finite Fields

By Abdulah Abdulah Zadeh

Part of book: Cryptography and Security in Computing