Search results
Results from the WOW.Com Content Network
Modern Cryptography Theory and Practice ISBN 0-13-066943-1. An up-to-date book on cryptography. Touches on provable security, and written with students and practitioners in mind. Mel, H.X., and Baker, Doris (2001). Cryptography Decrypted, Addison Wesley ISBN 0-201-61647-5. This technical overview of basic cryptographic components (including ...
In addition to computer security, Easttom has done work in software engineering., [9] [10] applied mathematics, quantum computing, and other areas.He has authored 43 books [11] on computer security, programming languages, Linux, cyber forensics, quantum computing, computer networks, penetration testing, and cryptography.
The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic ...
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography is a book by Simon Singh, published in 1999 by Fourth Estate and Doubleday. The Code Book describes some illustrative highlights in the history of cryptography , drawn from both of its principal branches, codes and ciphers .
The Encyclopedia of Cryptography and Security is a comprehensive work on Cryptography for both information security professionals and experts in the fields of Computer Science, Applied Mathematics, Engineering, Information Theory, Data Encryption, etc. [1] It consists of 460 articles in alphabetical order and is available electronically and in print.
Augustus the Younger, Duke of Brunswick-Lüneburg, wrote a standard book on cryptography; Ibn Wahshiyya: published several cipher alphabets that were used to encrypt magic formulas. [1] John Dee, wrote an occult book, which in fact was a cover for crypted text
Pages in category "Cryptography books" The following 18 pages are in this category, out of 18 total. This list may not reflect recent changes. *
It is one of the foundational treatments (arguably the foundational treatment) of modern cryptography. [2] His work has been described as a "turning point, and marked the closure of classical cryptography and the beginning of modern cryptography." [3] It has also been described as turning cryptography from an "art to a science". [4]