Publication | Closed Access
Handbook of applied cryptography
10.4K
Citations
280
References
1997
Year
Valuable ReferenceCryptographic PrimitiveRapid AccessEngineeringInformation SecurityCryptographic TechnologyInformation ForensicsBlock CipherFormal VerificationNumbered DefinitionsHardware SecurityPublic Key AlgorithmInternet Of ThingsComputer EngineeringData PrivacyLightweight CryptographyComputer ScienceData SecurityCryptographyCryptographic ProtectionApplied CryptographyBlockchain
From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols; more than 200 tables and figures; more than 1,000 numbered definitions, facts, examples, notes, and remarks; and over 1,250 significant references, including brief comments on each paper.
| Year | Citations | |
|---|---|---|
1948 | 78.4K | |
1958 | 29.7K | |
1991 | 16.9K | |
2002 | 8.2K | |
1975 | 7K | |
1993 | 4.6K | |
1960 | 3.6K | |
1979 | 3.4K | |
1991 | 2.8K | |
1976 | 2.7K |
Page 1
Page 1