 |
|
 Encyclopedia of Cryptology
Secret writing for the transmission of messages has been practiced for nearly 4,000 years. According to David Kahn, the great historian of cryptology, the first example of an intentionally altered message can be traced to a tomb in ancient Egypt dated about 1900 b.c. In the 40 centuries since that... |  |  Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007The rst International Workshop on Coding and Cryptology was held in Wuyi Mountain, Fujian, China, June 11 - 15, 2007. The workshop was organised by Fujian Normal University, China and Nanyang Technological University, Singapore. We acknowledge with gratitude the nancial support from the Key Laboratory of Network Security and Cryptology, Fujian... |  |  Modern Cryptology: A Tutorial (Lecture Notes in Computer Science)
The present work grew out of lecture notes I prepared for a Vh hour tutorial
that I was invited to give at the 29th IEEE Computer Conference (CompCon)
in San Francisco on February 27, 1987. I have just completed a substantial
update of the material, including the addition of several topics. My main
purpose is to provide a... |
|
 Complexity Theory and CryptologyModern cryptology increasingly employs mathematically rigorous concepts and methods from complexity theory. Conversely, current research topics in complexity theory are often motivated by questions and problems from cryptology. This book takes account of this situation, and therefore its subject is what may be dubbed "cryptocomplexity'', a... |  |  Cryptology UnlockedCryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.
This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic... |  |  Making, Breaking Codes: Introduction to Cryptology
This book is an introduction to modern ideas in cryptology and how to employ
these ideas. It includes the relevant material on number theory, probability, and
abstract algebra, in addition to descriptions of ideas about algorithms and com
plexity theory. Three somewhat different terms appear in the discussion of secure
communications... |
|
 Practical Cryptology and Web SecuritySecurity is now the number one concern for businesses world wide. The gold standard for attaining security is cryptography; it provides the most reliable tools for storing or transmitting digital information. This is the first textbook showing students how to implement cryptography and incorporate it into real-world systems on the Web. ... |  |  |  |  |
|
 |  |  Contemporary Cryptology (Advanced Courses in Mathematics - CRM Barcelona)
In February 2004, at the Universitat Polit`ecnica de Catalunya, we presented a
45-hour Advanced Course on Contemporary Cryptology, organised by the Centre
de Recerca Matem`atica. This volume is an expanded and unified version of the
material presented in the lectures and the background material that we distributed
among the... |  |  |
|
| Result Page: 4 3 2 1 |