Geometry.Net - the online learning center
Home  - Science - Cryptography
e99.com Bookstore
  
Images 
Newsgroups
Page 2     21-40 of 176    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Cryptography:     more books (100)
  1. Cryptography for Dummies by Chey Cobb, 2004-01-30
  2. Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More by John Viega, Matt Messier, 2003-07-14
  3. Cryptography in C and C++, Second Edition by Michael Welschenbach, 2005-05-25
  4. Beginning Cryptography with Java by David Hook, 2005-08-19
  5. Malicious Cryptography: Exposing Cryptovirology by Adam Young, Moti Yung, 2004-02-27
  6. Handbook of Applied Cryptography by Alfred J. Menezes, 1997
  7. Introduction to Cryptography with Coding Theory (2nd Edition) by Wade Trappe, Lawrence C. Washington, 2005-07-25
  8. Foundations of Cryptography: Volume 2, Basic Applications by Oded Goldreich, 2009-09-17
  9. Cryptography and Data Security by Dorothy Elizabeth Robling Denning, 1982-06
  10. Cryptography: An Introduction (Student Mathematical Library, Vol. 18) (Student Mathematical Library, V. 18) by V. V. Yashchenko, 2002-11-21
  11. Cryptography and Network Security: Principles and Practice (3rd Edition) by William Stallings, 2002-08-27
  12. Cryptography Demystified by John Hershey, 2002-08-23
  13. Topics in Geometry, Coding Theory and Cryptography (Algebra and Applications)
  14. Java Cryptography (Java Series) by Jonathan Knudsen, 1998-05-01

21. Cryptography Scientific Freedom And Human Rights Issues
U.S. Congressional briefing Was held to bring two more issues into the policy discussion scientific freedom to conduct and express cryptographic research, and human rights applications of cryptographic technologies.
http://www.aaas.org/spp/dspp/cstc/briefing/crypto/

22. Cryptography Theory And Practice
cryptography Theory and Practice. the book s cover. Translations. cryptographyTheory and Practice has been translated into French by Serge Vaudenay.
http://www.cacr.math.uwaterloo.ca/~dstinson/CTAP.html
Cryptography Theory and Practice
last modified March 27, 2000 This is the (old) web page for the first edition of the book. A second edition has now been published, and its web page is here This cryptography textbook by Doug Stinson was published in March, 1995, by CRC Press, Inc
It was reprinted with corrections in late 1996: click here
This home page contains the following sections:
The Fourth Printing
At the end of Novermber, 1996, the book was reprinted with corrections. This is the fourth printing of the book. (You can check which printing of the book you have by looking at the second last line of the back of the cover page. The first number in the sequence specifies the printing. For example, the fourth printing looks like 4 5 6 7 8 9 0.) The following are the (only) changes in the fourth pringing:

23. Cryptography FAQ Index
cryptography FAQ. cryptographyfaq/part01. Subject cryptography FAQ (01/10 Overview Last-modified 1999/06/27. cryptography-faq/part02. Subject cryptography FAQ (02/10 Net Etiquette
http://www.cis.ohio-state.edu/hypertext/faq/usenet/cryptography-faq/top.html
Search FAQs - Full Text Search Subject/Archive Names Search Article Headers Cryptography FAQ

24. Server Gated Cryptography
Server Gated cryptography (SGC) overview, FAQ, technical information and related links. (Microsoft)
http://www.microsoft.com/security/tech/sgc/

25. Cryptography FAQ (01/10: Overview)
Part01 Part02 - Part03 - Part04 - Part05 - Part06 - Part07 - Part08 - Part09 -Part10. cryptography FAQ (01/10 Overview). What is cryptology? cryptography?
http://www.faqs.org/faqs/cryptography-faq/part01/
Cryptography FAQ (01/10: Overview)
There are reader questions on this topic!
Help others by sharing your knowledge
sci.crypt talk.politics.crypto Subject: Cryptography FAQ (01/10: Overview) From: crypt-comments@math.ncsu.edu Reply-To: crypt-comments@math.ncsu.edu http://theory.lcs.mit.edu/~rivest/crypto-security.html
Rate this FAQ N/A Worst Weak OK Good Great
Current Top-Rated FAQs

Are you an expert in this area? Share your knowledge and earn expert points by giving answers or rating people's questions and answers! This section of FAQS.ORG is not sanctioned in any way by FAQ authors or maintainers. Questions strongly related to this FAQ:

26. SSH : Support : Cryptography A-Z
cryptography has become one of the main tools for privacy, trust, access control,electronic payments, corporate security, and countless other fields.
http://www.ssh.com/support/cryptography/
Sitemap Purchase Download Resources Contact Home Company Products Services ... Online Resources
As we move into an information society, the technological means for global surveillance of millions of individual people are becoming available to major governments. Cryptography has become one of the main tools for privacy, trust, access control, electronic payments, corporate security, and countless other fields.
The use of cryptography is no longer a privilege reserved for governments and highly skilled specialists, but is becoming available for everyone to make use of.
ALL INFORMATION HERE IS PROVIDED AS IS, AND THERE IS NO WARRANTY OF ANY KIND, INCLUDING BUT NOT LIMITED TO THE ACCURACY OF THE INFORMATION OR THE LEGALITY OF THE REFERENCED SOFTWARE IN ANY PARTICULAR COUNTRY.
Knowledge Base and FAQ contains extensive technical information about SSH products including howtos and troubleshooting tips.
Home
Company Products Solutions ...
legal notice
and

27. Why Cryptography Is Harder Than It Looks
Essay on pitfalls of implementing and using secure systems.
http://www.counterpane.com/whycrypto.html
This page has moved to schneier.com. On most browsers, you will be redirected automatically; if not, click here

28. SSH : Support : Cryptography A-Z : Introduction To Cryptography
People mean different things when they talk about cryptography. cryptographyis no longer a military thing that should not be messed with.
http://www.ssh.com/support/cryptography/introduction/
Sitemap Purchase Download Resources Contact Home Company Products Services ... Online Resources
People mean different things when they talk about cryptography. Children play with toy ciphers and secret languages. However, these have little to do with real security and strong encryption. Strong encryption is the kind of encryption that can be used to protect information of real value against organized criminals, multinational corporations, and major governments. Strong encryption used to be only military business; however, in the information society it has become one of the central tools for maintaining privacy and confidentiality.
As we move into an information society, the technological means for global surveillance of millions of individual people are becoming available to major governments. Cryptography has become one of the main tools for privacy, trust, access control, electronic payments, corporate security, and countless other fields.
Cryptography is no longer a military thing that should not be messed with. It is time to de-mystify cryptography and make full use of the advantages it provides for the modern society.
In the following, basic terminology and the main methods of cryptography are presented. Any opinions and evaluations presented here are speculative, and neither the authors nor SSH can be held responsible for their correctness - although every attempt is made to make sure that this information is as correct and up-to-date as possible.

29. Python Cryptography Toolkit
A collection of cryptographic algorithms and protocols, implemented for use from Python. Open Source, Python license
http://www.amk.ca/python/code/crypto.html
Home Python Code
Python Cryptography Toolkit
Search amk.ca
This page last modified: 3 May 2004 Cryptography toolkit GPG module jwzthreading Medusa ... SANE module The Toolkit is a collection of cryptographic algorithms and protocols, implemented for use from Python. The current release is 1.9alpha6. Among the contents of the package:
  • Hash functions: MD2, MD4, RIPEMD.
  • Block encryption algorithms: AES, ARC2, Blowfish, CAST, DES, Triple-DES, IDEA, RC5.
  • Stream encryption algorithms: ARC4, simple XOR.
  • Public-key algorithms: RSA, DSA, ElGamal, qNEW.
  • Protocols: All-or-nothing transforms, chaffing/winnowing.
  • Miscellaneous: RFC1751 module for converting 128-key keys into a set of English words, primality testing.
  • Some demo programs (currently all quite old and outdated).
There's a SourceForge project for Python-related cryptography code, the pycrypto project . Use it to report bugs submit patches , and to get a copy of the current CVS tree . See below for a link to the most recent released version.
Note on Exporting Crypto Code
With the relaxing of US export controls for encryption software, it's now possible to distribute cryptographic source code and export it from the US, so now anyone in the world can download the Python Cryptography Toolkit.

30. Fortify For Netscape - Home Page
Provides free, worldwide, unconditional, full strength 128-bit cryptography to users of Netscape Navigator and Communicator.
http://www.fortify.net/
This page uses frames, but your browser doesn't support them.

31. Cryptography For Visual Basic: Using Encryption And The CryptoAPI With Visual Ba
A resource site for Visual Basic developers interested in implementing cryptography or the CryptoAPI.
http://www.cryptovb.com/
e n t e r e n t e r

32. Foundations Of Cryptography By Oded Goldreich
Foundations of cryptography (Fragments of a Book). Oded Goldreich. This 1998).See also The Foundations of cryptography An Essay (1997).
http://theory.lcs.mit.edu/~oded/frag.html
Foundations of Cryptography (Fragments of a Book)
Oded Goldreich
This webpage provides access to the old fragments that are currently superseeded by a book in preparation In general, my webpages at this site (MIT) are no longer updated, and so you way want to look at my updated webpages starting from my homepage (at the Weizmann Institute) Out of 10 chapters planned for the book only 4 exist. Furthermore, these chapters are in preliminary form and I expect them to be full of various mistakes ranging from spelling and grammatical errors to minor technical inaccuracies. I hope and believe that they are no fatal mistakes, but I cannot guarantee this either. Yet, its seems preferable to place these fragments in public domain rather than wait till the original plan is completed.
  • README (preface and organization)
  • Table of Contents [ HTML ] and [ PostScript
  • The fragments are available in six parts (PostScript files), each part having two versions: The one posted in 1995 (denoted v.o. ) to which the above refers, and an on-going revision of it (denoted rev.

33. Cryptography And Security
Explanation of encryption, ECHELON, multiple file encryption software, and why you need encryption.
http://hermetic.nofadz.com/crypto.htm
German version Cryptography and Security
Powered by Bravenet

Who needs encryption? Anyone who values privacy. The #59 issue of CovertAction Quarterly has an article by New Zealand writer Nicky Hagar about the Global Surveillance Network, which is the means whereby the governments of the U.S.A. and the U.K., and to a lesser extent those of Canada, Australia and New Zealand (the five countries in the UKUSA espionage 'alliance') attempt to eavesdrop on every international telex, fax and email message. This is the ECHELON system , run by the U.S. National Security Agency (NSA). In July 1997 plans were announced to double the capacity of the New Zealand spy station and to tap phone calls as well as non-voice communications (see Spy Power Boost for Secret Station ). The way to foil the NSA eavesdroppers is to encrypt all communications. Their computers are the fastest that U.S. taxpayers' money can buy, but if many more people use encryption the NSA's computers will be overwhelmed by the sheer volume of encrypted traffic.
These reports suggest that if you use an application program which uses Microsoft's CryptoAPI to encrypt data which you store on your PC then the NSA has a backdoor to that data, that is, the NSA can read what you think you have safely hidden away from their prying eyes.

34. Page Not Found
Nightingale. Home. RSA Laboratories Frequently Asked Questions AboutToday s cryptography, Version 4.1. Comments on the FAQ are encouraged.
http://www.rsasecurity.com/rsalabs/faq/
We're sorry, but due to a recent renovation of the RSA Security site, many of our page URLs have changed. In a few seconds, you will be redirected to the new URL for the page you requested. If you have arrived at this page via a bookmark in your web browser, please take a moment to update it to the new URL. We're sorry for any inconvenience this may have caused. This document has moved to: Crypto FAQ

35. Delphi Stuff
Implementations by Dave Shapiro of two symmetric encryption algorithms (Blowfish and DES) and several message digests (MD2, MD4, MD5, SHA1, and RipeMD-160). Freeware with Delphi source code.
http://www.csd.net/~daves/delphi/
Delphi Stuff I haven't quite decided what I'm going to do with this page yet. I could include a tips-and-tricks page, or I could have links to other good Delphi sites. For now, I'll just put some of my code up, free for using, making fun of, etc.
  • bmpRot
    A unit for rotating TBitmaps 90, 180, or 270 degrees. Works in D1, D2, D3, and D4. Not entirely optimized, but quick enough. It rotates a 1600x1200 image in 800 msec on my Pentium II (400 MHz).
  • BlockCiphers
    A block cipher class hierarchy. Currently includes TDESCipher and TBlowfishCipher, with more to come soon. The ciphers all descend from TBlockCipher, whose constructor is virtual, allowing for polymorphic instantiation of any cipher you choose. The DES implementation has been heavily optimized with a lot of help from Bob Lee. It encrypts 4.2 megs/sec on my Pentium II. Blowfish has been similarly optimized, encrypting 6.5 megs/sec.
  • TPanZoomPanel
    Here at last, my TPanZoomPanel. This is a descendant of TPanel that can display an image, pan, zoom, and paint on it. You can define a coordinate system at any time, and it will remain true through all the panning and zooming you want.

36. Technical Details On Server Gated Cryptography
Describes the difference between the SGC protocol and SSL/TLS. Also covers the implementation of SGC in Netscape products. (Microsoft)
http://www.microsoft.com/security/tech/sgc/TechnicalDetails.asp

37. Goldbach's Conjecture And Factoring The Cryptographic Modulus
Algebraic Factoring of the cryptography Modulus and Proof of Goldbach's Conjecture
http://findprimenumbers.coolissues.com/goldbach.htm

38. Thomas William Korner, Korner's Korner, Pleasures Of Counting, T.W.Korner, Mathe
Lecture notes at Tom Koerner's home page.
http://www.dpmms.cam.ac.uk/~twk/
Korner's Korner
It used to be possible to download a first draft of A COMPANION TO ANALYSIS from this page, but the splendid folk at the AMS have now published it as an elegant looking book. A COMPANION TO ANALYSIS may be ordered from the AMS bookstore or, we hope, your local bookshop for a mere $79 (even less if you are an AMS member). There is a collection of sketched answers to some of the exercises in Appendix K of the book at PS DVI and PDF Next let me remind you that The Pleasures of Counting is still available from all good bookshops. Longer than `With Rod and Line Through the Gobi Desert', funnier than `The Wit and Wisdom of the German General Staff' and with more formulae than `A Brief History of Time' it was voted Book of the Year CUP's gleaming modern web site If you wish to read it in German then Michael Basler has produced a splendid translation here Mathematika says `A cracking good tale; buy it for your children and read it yourself.' Mathematics Magazine says `None of "introvert", "extrovert", nor "anchor" appears [in the index.]' Computer Shopper says `a real gem of a book' The Australian's Review of Books says `[a] generous bouquet .... [but] don't think ikebana here'

39. Deadlines
Maintained by Anne Canteaut, INRIA.
http://www-rocq.inria.fr/codes/Anne.Canteaut/annonces.html
Prochaines conférences
Deadlines
Conférences dont les deadlines sont passés

40. Index Of /
Index of /. Parent Directory; bin; crypto; dcine; debian; etc; freecryp.htm;getpgp.htm; getpgp.txt; ietf; incoming; index.htm; jacks; karn; lib;
http://www.cryptography.org/
Index of /

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Page 2     21-40 of 176    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20

free hit counter