enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Alice and Bob - Wikipedia

    en.wikipedia.org/wiki/Alice_and_Bob

    The Alice and Bob characters were created by Ron Rivest, Adi Shamir, and Leonard Adleman in their 1978 paper "A Method for Obtaining Digital Signatures and Public-key Cryptosystems". [2] Subsequently, they have become common archetypes in many scientific and engineering fields, such as quantum cryptography , game theory and physics . [ 3 ]

  3. The Cuckoo's Egg (book) - Wikipedia

    en.wikipedia.org/wiki/The_Cuckoo's_Egg_(book)

    The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage is a 1989 book written by Clifford Stoll. It is his first-person account of the hunt for a computer hacker who broke into a computer at Lawrence Berkeley National Laboratory (LBNL). Stoll's use of the term extended the metaphor Cuckoo's egg from brood parasitism in birds to ...

  4. List of fictional hackers - Wikipedia

    en.wikipedia.org/wiki/List_of_fictional_hackers

    This is a list of fictional hackers in comics, films, video games, and other media. Hollywood films of the 1980s and 1990s typically portrayed hackers as "unintentional criminals" who end up becoming heroes, even as they were hunted by law enforcement.

  5. Bibliography of cryptography - Wikipedia

    en.wikipedia.org/wiki/Bibliography_of_cryptography

    Listing and reviews for a large number of books in cryptography; A long list of works of fiction where the use of cryptology is a significant plot element. The list is in English. List of where cryptography features in literature — list is presented in German. It draws on the English list above.

  6. Category:Computer security books - Wikipedia

    en.wikipedia.org/wiki/Category:Computer_security...

    Cryptography books (1 C, 18 P) Pages in category "Computer security books" The following 16 pages are in this category, out of 16 total.

  7. List of cryptographers - Wikipedia

    en.wikipedia.org/wiki/List_of_cryptographers

    Al-Khalil ibn Ahmad al-Farahidi: wrote a (now lost) book on cryptography titled the "Book of Cryptographic Messages". Al-Kindi, 9th century Arabic polymath and originator of frequency analysis. Athanasius Kircher, attempts to decipher crypted messages; Augustus the Younger, Duke of Brunswick-Lüneburg, wrote a standard book on cryptography

  8. Cypherpunks (book) - Wikipedia

    en.wikipedia.org/wiki/Cypherpunks_(book)

    There is no other way for our intellectual life to gain proper independence from the security guards of the world, the people who control physical reality. [1] Assange later wrote in The Guardian: "Strong cryptography is a vital tool in fighting state oppression." saying that was the message of his book, Cypherpunks. [3]

  9. Category:Cryptography books - Wikipedia

    en.wikipedia.org/wiki/Category:Cryptography_books

    Cryptography books. Subcategories. This category has only the following subcategory. F. Fiction about cryptography (2 C, 26 P) Pages in category "Cryptography books"