


default search action
Information Security and Cryptography
2026
- David A. Basin

, Cas Cremers, Jannik Dreier, Ralf Sasse
:
Modeling and Analyzing Security Protocols with Tamarin - A Comprehensive Guide. Information Security and Cryptography, Springer 2026, ISBN 978-3-031-90935-1, pp. 3-276 - Michele Ciampi

, Luisa Siniscalchi:
Round and Computational Efficiency of Multi-party Protocols. Information Security and Cryptography, Springer 2026, ISBN 978-3-031-92373-9, pp. 1-280
2025
- Ashish Choudhury, Arpita Patra

:
Fault-Tolerant Distributed Consensus in Synchronous Networks. Information Security and Cryptography, Springer 2025, ISBN 978-3-031-80459-5, pp. 1-312
2022
- Laurent Chuat, Markus Legner, David A. Basin, David Hausheer, Samuel Hitz, Peter Müller, Adrian Perrig:

The Complete Guide to SCION - From Design Principles to Formal Verification. Information Security and Cryptography, Springer 2022, ISBN 978-3-031-05287-3 - Jörg Schwenk:

Guide to Internet Cryptography - Security Protocols and Real-World Attack Implications. Information Security and Cryptography, Springer 2022, ISBN 978-3-031-19438-2, pp. 1-523
2021
- Arno Mittelbach, Marc Fischlin:

The Theory of Hash Functions and Random Oracles - An Approach to Modern Cryptography. Information Security and Cryptography, Springer 2021, ISBN 978-3-030-63286-1, pp. 1-778 - Yan Lin:

Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity. Information Security and Cryptography, Springer 2021, ISBN 978-3-030-73140-3, pp. 1-95 - Paul C. van Oorschot:

Computer Security and the Internet - Tools and Jewels from Malware to Bitcoin, Second Edition. Information Security and Cryptography, Springer 2021, ISBN 978-3-030-83410-4, pp. 1-409
2020
- Colin Boyd, Anish Mathuria, Douglas Stebila

:
Protocols for Authentication and Key Establishment, Second Edition. Information Security and Cryptography, Springer 2020, ISBN 978-3-662-58145-2, pp. 1-440 - Paul C. van Oorschot:

Computer Security and the Internet - Tools and Jewels. Information Security and Cryptography, Springer 2020, ISBN 978-3-030-33648-6, pp. 1-338 - Joan Daemen, Vincent Rijmen

:
The Design of Rijndael - The Advanced Encryption Standard (AES), Second Edition. Information Security and Cryptography, Springer 2020, ISBN 978-3-662-60768-8, pp. 1-247 - Mário S. Alvim, Konstantinos Chatzikokolakis, Annabelle McIver

, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith:
The Science of Quantitative Information Flow. Information Security and Cryptography, Springer 2020, ISBN 978-3-319-96129-3, pp. I-XXVIII, 1-478
2018
- Rosario Giustolisi

:
Modelling and Verification of Secure Exams. Information Security and Cryptography, Springer 2018, ISBN 978-3-319-67106-2, pp. 1-123
2017
- Adrian Perrig

, Pawel Szalachowski, Raphael M. Reischuk, Laurent Chuat:
SCION: A Secure Internet Architecture. Information Security and Cryptography, Springer 2017, ISBN 978-3-319-67079-9, pp. 3-386
2016
- Joel Reardon:

Secure Data Deletion. Information Security and Cryptography, Springer 2016, ISBN 978-3-319-28777-5, pp. 3-186 - Nigel P. Smart:

Cryptography Made Simple. Information Security and Cryptography, Springer 2016, ISBN 978-3-319-21935-6, pp. 3-450
2015
- Hans Delfs, Helmut Knebl:

Introduction to Cryptography - Principles and Applications, Third Edition. Information Security and Cryptography, Springer 2015, ISBN 978-3-662-47973-5, pp. 1-396
2014
- Benny Applebaum:

Cryptography in Constant Parallel Time. Information Security and Cryptography, Springer 2014, ISBN 978-3-642-17366-0, pp. 1-185 - Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan, Luca Henzen:

The Hash Function BLAKE. Information Security and Cryptography, Springer 2014, ISBN 978-3-662-44756-7, pp. 1-185
2012
- Cas Cremers, Sjouke Mauw

:
Operational Semantics and Verification of Security Protocols. Information Security and Cryptography, Springer 2012, ISBN 978-3-540-78636-8, pp. 1-155 - Marc Joye, Michael Tunstall

:
Fault Analysis in Cryptography. Information Security and Cryptography, Springer 2012, ISBN 978-3-642-29655-0 [contents]
2011
- Lars R. Knudsen, Matthew Robshaw:

The Block Cipher Companion. Information Security and Cryptography, Springer 2011, ISBN 978-3-642-17341-7, pp. I-XIV, 1-267
2010
- Rainer Böhme:

Advanced Statistical Steganalysis. Information Security and Cryptography, Springer 2010, ISBN 978-3-642-14312-0, pp. 1-217 - Carmit Hazay, Yehuda Lindell:

Efficient Secure Two-Party Protocols - Techniques and Constructions. Information Security and Cryptography, Springer 2010, ISBN 978-3-642-14302-1, pp. 3-254 - Sergey Yekhanin:

Locally Decodable Codes and Private Information Retrieval Schemes. Information Security and Cryptography, Springer 2010, ISBN 978-3-642-14357-1, pp. 1-74 - Ahmad-Reza Sadeghi, David Naccache:

Towards Hardware-Intrinsic Security - Foundations and Practice. Information Security and Cryptography, Springer 2010, ISBN 978-3-642-14451-6 [contents] - Phong Q. Nguyen, Brigitte Vallée:

The LLL Algorithm - Survey and Applications. Information Security and Cryptography, Springer 2010, ISBN 978-3-642-02294-4 [contents] - Alexander W. Dent, Yuliang Zheng:

Practical Signcryption. Information Security and Cryptography, Springer 2010, ISBN 978-3-540-89409-4 [contents]
2007
- Giampaolo Bella:

Formal Correctness of Security Protocols - With 62 Figures and 4 Tables. Information Security and Cryptography, Springer 2007, ISBN 978-3-540-68134-2, pp. 1-234 - Hans Delfs, Helmut Knebl:

Introduction to Cryptography - Principles and Applications, Second Edition. Information Security and Cryptography, Springer 2007, ISBN 978-3-540-49243-6, pp. 1-287
2006
- Alon Rosen:

Concurrent Zero-Knowledge - With Additional Background by Oded Goldreich. Information Security and Cryptography, Springer 2006, ISBN 978-3-540-32938-1, pp. I-XIII, 1-184
2003
- Colin Boyd, Anish Mathuria:

Protocols for Authentication and Key Establishment. Information Security and Cryptography, Springer 2003, ISBN 978-3-642-07716-6, pp. I-XXIV, 1-323
2002
- Joan Daemen, Vincent Rijmen:

The Design of Rijndael: AES - The Advanced Encryption Standard. Information Security and Cryptography, Springer 2002, ISBN 3-540-42580-2 - Hans Delfs, Helmut Knebl:

Introduction to Cryptography - Principles and Applications. Information Security and Cryptography, Springer 2002, ISBN 3-540-42278-1

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














