Contact
DMCA
Privacy Policy
EBookin
Toggle navigation
Categories
Genre
Best Book 2021
Best Young Adult Books
Best Sci-Fict & Fantasy
NY Times Best Books
Best Romance Novel
Best self-published Amazon
Best Kindle & Prime Amazon
100 Books to Read
100 Child Books to Read
Art
Biography
Business
Childrens
Classics
Comics
Contemporary
Manga
Memoir
Music
Mystery
Non Fiction
Poetry
Psychology
Cookbooks
Religion
Crime
Romance
Science
Fantasy
Science Fiction
Fiction
Graphic Novels
Sport
History
Thriller
Horror
Travel
Humor and Comedy
Young Adult
More Than
12,0657,538
Books Collection
Home
New release
Popular Books
Most Read
Popular Author
Crypt F Books Categories
home
Crypt F Books Categories
Crypt F Categories Books List
Crypt F Books Categories
View More
IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms (Lecture Notes in Computer Science (1958))
By:
Simone Fischer-H??bner
View More
Secure Multi-Party Computation: Standard Requirements (Paperback)
By:
Gerard Blokdyk
View More
Modern Cryptography: Applied Mathematics for Encryption and Information Security (Kindle Edition)
By:
William Easttom
View More
The Joy of Cryptography (ebook)
By:
Mike Rosulek
View More
Computer Security and the Internet: Tools and Jewels (Information Security and Cryptography)
By:
Paul C. van Oorschot
View More
Full Stack Python Security: Cryptography, TLS, and attack resistance (Kindle Edition)
By:
Dennis Byrne
View More
Secure Multiparty Computation and Secret Sharing (Kindle Edition)
By:
Ronald Cramer
View More
Homomorphic Encryption and Applications (SpringerBriefs in Computer Science)
By:
Xun Yi
View More
Introduction to Public Key Infrastructures (Hardcover)
By:
Johannes A. Buchmann
View More
Proofs, Arguments, and Zero-Knowledge (Foundations and Trends(r) in Privacy and Security)
By:
Justin Thaler
View More
A Pragmatic Introduction to Secure Multi-Party Computation (ebook)
By:
David Evans
View More
Tutorials on the Foundations of Cryptography: Dedicated to Oded Goldreich (Information Security and Cryptography)
By:
Yehuda Lindell
View More
A Decade of Lattice Cryptography (Foundations and Trends(r) in Theoretical Computer Science)
By:
Chris Peikert
View More
Access Control, Authentication, and Public Key Infrastructure: . (Information Systems Security & Assurance)
By:
Bill Ballad
View More
Secret Key Cryptography: Ciphers, from simple to unbreakable (Paperback)
By:
Frank Rubin
View More
Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)
By:
Carmit Hazay
View More
Using Hard Problems to Create Pseudorandom Generators (ACM Doctoral Dissertation Award)
By:
Noam Nisan
View More
Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems, 34)
By:
Charu C. Aggarwal
View More
Guide to Internet Cryptography: Security Protocols and Real-World Attack Implications (Information Security and Cryptography)
By:
Jörg Schwenk
View More
Privacy-Preserving Machine Learning (Paperback)
By:
J. Morris Chang
View More
Fully Homomorphic Encryption in Real World Applications (Computer Architecture and Design Methodologies)
By:
Ayantika Chatterjee
View More
Advanced Research in Data Privacy (Studies in Computational Intelligence, 567)
By:
Guillermo Navarro-Arribas
View More
Encyclopedia of Cryptography, Security and Privacy (Paperback)
By:
Sushil Jajodia
View More
Searchable Encryption: From Concepts to Systems (Wireless Networks)
By:
Kui Ren
View More
Secure Multi-Party Computation (ebook)
By:
Manoj M. Prabhakaran
View More
Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques (Chapman & Hall/CRC Data Mining and Knowledge Discovery)
By:
Benjamin C.M. Fung
View More
Formal Correctness of Security Protocols (Information Security and Cryptography)
By:
Giampaolo Bella
View More
Security and Privacy in New Computing Environments: 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings ... and Telecommunications Engineering) (Paperback)
By:
Wenbo Shi
View More
Modern Cryptography Volume 2: A Classical Introduction to Informational and Mathematical Principle (Financial Mathematics and Fintech)
By:
Zhiyong Zheng
View More
Information-theoretic Cryptography (Hardcover)
By:
Himanshu Tyagi
View More
SCION: A Secure Internet Architecture (Information Security and Cryptography)
By:
Adrian Perrig
View More
Secure Multi-Party Computation Against Passive Adversaries (Synthesis Lectures on Distributed Computing Theory)
By:
Ashish Choudhury
View More
Modern Cryptography Volume 1: A Classical Introduction to Informational and Mathematical Principle (Financial Mathematics and Fintech)
By:
Zhiyong Zheng
View More
Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project (Mathematics for Industry, 29)
By:
Tsuyoshi Takagi
View More
Partially Homomorphic Encryption (Hardcover)
By:
Çetin Kaya Koç
View More
Applications of Secure Multiparty Computation (Cryptology and Information Security, 13)
By:
P. Laud
View More
Protecting Privacy through Homomorphic Encryption (Hardcover)
By:
Kristin Lauter
View More
Advances in Cybersecurity Management (Hardcover)
By:
Kevin Daimi
View More
Security and Privacy in Communication Networks: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, ... and Telecommunications Engineering, 304) (Paperback)
By:
Songqing Chen
View More
Adaptive Autonomous Secure Cyber Systems (Hardcover)
By:
Sushil Jajodia
View More
Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected ... Notes in Computer Science Book 10323) (Kindle Edition)
By:
Michael Brenner
View More
Compilation for Secure Multi-party Computation (SpringerBriefs in Computer Science)
By:
Niklas Büscher
View More
Computer System and Network Security (Computer Science & Engineering)
By:
Gregory B White
View More
Security, Privacy and Trust in Cloud Systems (Hardcover)
By:
Surya Nepal
View More
Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation (Kindle Edition)
By:
Thomas Schneider
View More
Computer Security – ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings (Lecture Notes in Computer Science, 6879)
By:
Vijay Atluri
View More
Information Theoretic Security (Foundations and Trends in Communications and Information Theory)
By:
Yingbin Liang
View More
Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, ... (Lecture Notes in Computer Science, 2009)
By:
Hannes Federrath