Search results
Results from the WOW.Com Content Network
The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic ...
Brute Force: Cracking the Data Encryption Standard (2005, Copernicus Books ISBN 0387271600) is a book by Matt Curtin about cryptography.. In this book, Curtin recounts his involvement in the DESCHALL Project, mobilizing thousands of personal computers in 1997 in order to meet the challenge to crack a single message encrypted with DES.
Augustus the Younger, Duke of Brunswick-Lüneburg, wrote a standard book on cryptography; Ibn Wahshiyya: published several cipher alphabets that were used to encrypt magic formulas. [1] John Dee, wrote an occult book, which in fact was a cover for crypted text
Modern Cryptography Theory and Practice ISBN 0-13-066943-1. An up-to-date book on cryptography. Touches on provable security, and written with students and practitioners in mind. Mel, H.X., and Baker, Doris (2001). Cryptography Decrypted, Addison Wesley ISBN 0-201-61647-5. This technical overview of basic cryptographic components (including ...
The Encyclopedia of Cryptography and Security is a comprehensive work on Cryptography for both information security professionals and experts in the fields of Computer Science, Applied Mathematics, Engineering, Information Theory, Data Encryption, etc. [1] It consists of 460 articles in alphabetical order and is available electronically and in print.
Main page; Contents; Current events; Random article; About Wikipedia; Contact us; Pages for logged out editors learn more
Cryptography books (1 C, 18 P) Pages in category "Computer security books" The following 16 pages are in this category, out of 16 total.
is a book about cryptography written by Steven Levy, published in 2001. Levy details the emergence of public key cryptography, digital signatures and the struggle between the National Security Agency and the "cypherpunks". The book details the creation of Data Encryption Standard (DES), RSA and the Clipper chip. [1]