Geometry.Net - the online learning center
Home  - Science - Cryptography
e99.com Bookstore
  
Images 
Newsgroups
Page 3     41-60 of 176    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Cryptography:     more books (100)
  1. Guide to Elliptic Curve Cryptography (Springer Professional Computing) by Darrel Hankerson, Alfred J. Menezes, et all 2010-11-02
  2. Complexity and Cryptography: An Introduction by John Talbot, Dominic Welsh, 2006-02-20
  3. Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona) by Alexei Myasnikov, Vladimir Shpilrain, et all 2008-08-27
  4. Rsa Security's Official Guide to Cryptography by Steve Burnett, 2004-01
  5. Introduction to Cryptography (Undergraduate Texts in Mathematics) by Johannes Buchmann, 2004-07-13
  6. Number Story: From Counting to Cryptography by Peter Michael Higgins, 2008-02-25
  7. Post-Quantum Cryptography
  8. The Physics of Quantum Information: Quantum Cryptography, Quantum Teleportation, Quantum Computation
  9. Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking (The Morgan Kaufmann Series in Software Engineering and Programming) by Peter Wayner, 2008-12-17
  10. Java Cryptography Extensions: Practical Guide for Programmers (The Practical Guides) by Jason Weiss, 2004-03-12
  11. Internet Cryptography by Richard E. Smith, 1997-08-01
  12. A Classical Introduction to Cryptography: Applications for Communications Security by Serge Vaudenay, 2010-11-02
  13. Implementing Elliptic Curve Cryptography by Michael Rosing, 1998-01-01
  14. Protocols for Authentication and Key Establishment (Information Security and Cryptography) by Colin Boyd, Anish Mathuria, 2010-11-02

41. Chilkat Crypt -- Encryption Component With AES, RSA, Blowfish, Twofish, And Digi
Supports up to 256bit AES, 2048-bit RSA public-key cryptography, and digital signature creation and validation. By Chilkat Software, Inc. Component, Commercial
http://www.chilkatsoft.com/ChilkatCrypt.asp
AES and RSA Encryption and Digital Signature Component SEE ALSO: Chilkat Crypt.NET for C#, VB.NET, and ASP.NET Latest Release: v2.7.0
Register for your 30-day Unlock Code
Documentation
Change Log How to Unlock ... License
Chilkat Crypt is an ActiveX component that can be used in your security-sensitive Windows applications and websites (ASP) to secure information and to authenticate and validate data integrity. It supports the latest cryptographic standards and technology including up to 256-bit Advanced Encryption Standard (AES), RSA public-key cryptography, and digital signature creation/validation. Features
  • Royalty free licensing. (All Chilkat components are royalty free) Up to 2048-bit key RSA public-key encryption/decryption Digital signature creation and validation Up to 256-bit AES symmetric (password-based) encryption/decryption Up to 256-bit symmetric encryption/decryption using the Twofish algorithm Up to 256-bit symmetric encryption/decryption using the Blowfish algorithm Smart Cards Full control over what Cryptographic Service Provider is used.

42. WHERE TO GET PGP (Pretty Good Privacy)
Use it at your own risk. The master copies of this FAQ are at http//cryptography.org/getpgp.htmand http//cryptography.org/getpgp.txt.
http://www.cryptography.org/getpgp.htm
WHERE TO GET PGP and GPG
WHERE TO GET THE PRETTY GOOD PRIVACY PROGRAM (PGP) FAQ
Revised 14 August 2002 This FAQ applies to Pretty Good Privacy (PGP) Gnu Privacy Guard (GPG) , and some other OpenPGP implementations. The master copies of this FAQ are at http://cryptography.org/getpgp.htm and http://cryptography.org/getpgp.txt The official (much more complete) PGP FAQ is available at: http://www.pgp.net/pgpnet/pgp-faq/
WHERE ARE SOME OF THE BEST PLACES TO GET PGP ON THE WEB?
PGP freeware - for personal, noncommercial use
Gnu Privacy Guard - free even for commercial use

43. Page Not Found
PKCS Standards
http://www.rsasecurity.com/rsalabs/pkcs/index.html
We're sorry, but due to a recent renovation of the RSA Security site, many of our page URLs have changed. In a few seconds, you will be redirected to the new URL for the page you requested. If you have arrived at this page via a bookmark in your web browser, please take a moment to update it to the new URL. We're sorry for any inconvenience this may have caused. This document has moved to: Public-Key Cryptography Standards (PKCS)

44. EPIC Archive - Cryptography Policy
EPIC logo. cryptography Policy. Reports on cryptography Policy EPIC, cryptography Liberty 2000 An International Survey of Encryption Policy.
http://www.epic.org/crypto/
Cryptography Policy
Media Coverage of Recent Proposals Previous News Reports Policy Areas ... Other Materials In the wake of the terrorist attacks in New York City and Washington D.C. on September 11, 2001, there have been renewed calls among some lawmakers for restrictions on the use and availability of strong encryption products. In Congressional floor statements on September and , Senator Judd Gregg (R-NH) called for a global "new regime" in the area of encryption which would grant law enforcement access to private keys. Sen. Gregg has now stated, however, that he does not intend to introduce a bill to give effect to this proposal. Civil liberties and privacy advocates strongly oppose any attempts to require key escrow, key recovery or other means of accessing encryption keys, arguing that they are an unjustified restriction of individuals' fundamental privacy rights, detrimental to security, costly, subject to massive abuse, and ultimately ineffective crime prevention methods. Technology and security experts also oppose any restricitons on encryption, arguing that they would damage comsumer trust in e-commerce transactions. Media Coverage of Recent Proposals

45. Java Cryptography Extension (JCE)
Provides framework and implementations for encryption, key generation and key agreement, and Message Authentication Code (MAC) algorithms.
http://java.sun.com/products/jce/
developers.sun.com search tips Search: in Developers' Site in Sun.com
Developers Home
Java Technology Core Java Security ... Why Register?
Security Java Cryptography Extension (JCE) Downloads
Reference
API Specifications Documentation ...
Learning

The Java Cryptography Extension (JCE) is a set of packages that provides a framework and implementations for encryption, key generation and key agreement, and Message Authentication Code (MAC) algorithms. Support for encryption includes symmetric, asymmetric, block, and stream ciphers. The software also supports secure streams and sealed objects. JCE has two releases:
What's New
JCE Is Now in Java 2 SDK

June 2003
J2ME Foundation Profile 1.1 JSR 219
An expert group working via the Java Community Process is defining an optional package comprising the Java Secure Socket Extension (JSSE), Java Cryptography Extension (JCE), and Java Authentication and Authorization Service (JAAS) APIs for use with Java 2 Platform, Micro Edition (J2ME) Foundation Profile implementations.
Community Events 2004 JavaOne Conference.

46. Quantum Cryptography In Norway
Applicationoriented research at NTNU, Trondheim and Telenor, Oslo
http://www.fysel.ntnu.no/Optics/qcr/
Quantum Cryptography in Norway
a research project
  • Our research has been mentioned in article " Bomb-Proof Code " in Norwegian journal Teknisk Ukeblad
  • Presentation from the Norwegian Cryptographic Seminar is available for download
    Our publications
  • 47. DCCG Workshop, Lethbridge, July 2001
    Second Lethbridge Workshop on Designs, Codes, cryptography and Graph Theory a combination of instructional lectures and research sessions. Lethbridge, Alberta; July 914, 2001.
    http://www.cs.uleth.ca/dccg/
    Your browser is not frames capable. See no-frame version of this page.

    48. The Applied Cryptography Case
    The Applied cryptography Case Only Americans Can Type! In January14, 2000, new US crypto export regulations went into effect.
    http://people.qualcomm.com/karn/export/
    The Applied Cryptography Case: Only Americans Can Type!
    In January 14, 2000, new US crypto export regulations went into effect. Publicly available encryption source code, such as that at issue in my lawsuit, is now effectively freely exportable. Therefore, we decided to allow our case to be dismissed as moot. While this was admittedly not as satisfying as actually winning in court, for all practical purposes I got everything I wanted. My own case was narrowly focused on the government's ridiculous distinction between crypto source code printed on paper and crypto source code on electronic media. The other two challenges to US encryption export regulations, the Bernstein and Junger cases, are broader Constitutional attacks, and they continue through the appeals process. Junger got a ringing endorsement from the 6th Circuit Court of Appeals that was even more noteworthy in coming out after the January regulations. With two separate appellate courts now holding that source code is protected by the First Amendment, I think things are in much better shape than they were when I started my quest six and a half years ago. There are still some legal documents that I have not yet put up here. I will do that as I get the chance. (21 Jun 2000)

    49. How SSL Works
    The article explains how secure sockets layer (SSL) employs public key cryptography techniques for internet security. (Netscape).
    http://developer.netscape.com/tech/security/ssl/howitworks.html
    How SSL Works
    AN INTRODUCTION TO KEY CRYPTOGRAPHY RSA Data Security Inc. for use in its products, specifically for authentication. Public key encryption is a technique that uses a pair of asymmetric keys for encryption and decryption. Each pair of keys consists of a public key and a private key. The public key is made public by distributing it widely. The private key is never distributed; it is always kept secret. Data that is encrypted with the public key can be decrypted only with the private key. Conversely, data encrypted with the private key can be decrypted only with the public key. This asymmetry is the property that makes public key cryptography so useful. USING PUBLIC KEY CRYPTOGRAPHY FOR AUTHENTICATION Authentication is the process of verifying identity so that one entity can be sure that another entity is who it claims to be. In the following example involving Alice and Bob, public key cryptography is easily used to verify identity. The notation means that something has been encrypted or decrypted using key Suppose Alice wants to authenticate Bob. Bob has a pair of keys, one public and one private. Bob discloses to Alice his public key (the way he does this is discussed later). Alice then generates a random message and sends it to Bob:

    50. Avs Online: European Cryptography
    The European cryptography link database has been discontinued. I didnot find the time to maintain it. Sorry. I recommend the following
    http://www.modeemi.cs.tut.fi/~avs/eu-crypto.html
    Go to http://www.apparatus.org/~avs/cryptolinks/index.phtml

    51. Elliptic Curve Cryptography FAQ V1.12 22nd December 1997
    Explains the difference between an elliptical curve and an ellipse. Discusses fields, applications, choosing a fixed point, and related topics.
    http://www.cryptoman.com/elliptic.htm
    Elliptic curve cryptography FAQ v1.12 22nd December 1997
    by George Barwood
    (1) What is an elliptic curve?
    Well for a start, it is not the same as an ellipse! But to be more positive: from school mathematics, you probably know the equation for a circle centred on the (a,b) of radius r, which is (x-a)^2 + (y-b)^2 = r^2 where x, y, a, b and r are real numbers. An elliptic curve is also defined by an equation, but it has the slightly more complicated form: Again x and y are variables, a and b are constants. However, these quantities are not necessarily real numbers, instead they may be values from any field. For cryptographic purposes we always use a "finite" field - that is x, y, a and b are chosen from a finite set of distinct values. [In fact the equation given here is not the most general possible, but it will serve for the purposes of this FAQ, and as far as I know for all cryptographic purposes.]
    (2) What is a field?
    The familiar examples of fields are real numbers, complex numbers, rational numbers (fractions) and integers modulo a prime number. The latter is an example of a "finite field". The requirements of a field are normal addition and multiplication, plus the existence of both additive and multiplicative inverses (except that doesn't have a multiplicative inverse). To put it another way, a field has addition, subtraction, multiplication and division - and these operations always produce a result that is in the field, with the exception of division by zero, which is undefined.

    52. Java Cryptography Extension (JCE)
    The Java cryptography Extension (JCE) 1.2.2 is a package that provides a frameworkand implementations for encryption, key generation and key agreement, and
    http://java.sun.com/products/jce/index.jsp

    53. C4I.org - Strong Cryptography Links On The Internet
    Dealing with cryptography, information security, cryptographers government, commercial, university, and personal sites, newsgroups, publications, programs and applications.
    http://www.c4i.org/erehwon/crypto.html
    Please help support C4I.org and keep this free resource online! Strong cryptography makes the world a safer place
    or
    (Kinky sex makes the world go around) This page contains links and pointers to other web pages dealing with cryptography and information security, No doubt that its very incomplete, Please send additions and corrections to erehwon (at) c4i.org Commercial Organizations University Computer Sites

    54. Kluwer Academic Publishers - Designs, Codes And Cryptography
    (Kluwer) An archival peerreviewed technical journal publishing survey and original papers. Tables of contents and abstracts from vol.10 (1997) on. Full text to subscribers.
    http://www.kluweronline.com/issn/0925-1022/
    This web page uses frames, but your browser doesn't support them.

    55. The Cryptography Project
    The cryptography Project. Note This page is no longer being maintained. Go to myhome page for current pages. Denning Articles on cryptography and Wiretapping.
    http://www.cosc.georgetown.edu/~denning/crypto/
    The Cryptography Project
    Note: This page is no longer being maintained. Go to my home page for current pages. The Cryptography Project focuses on encryption policy, but some technology is also covered. This page provides links to papers that I have authored or co-authored and to other selected documents and web pages. See Dorothy E. Denning
    Denning Articles on Cryptography and Wiretapping

    56. Conference On Coding Theory, Cryptology, And Number Theory
    USNA, Annapolis, MD, USA; 2526 October 1998.
    http://web.usna.navy.mil/~wdj/talk98_30.htm
    USNA Mathematics Department
    Coding theory, Cryptology, and Number Theory Conference
    Time
    October 25 and 26, 1998
    Place USNA Math Dept, Chauvenet Hall, (most talks in C116, Peter Hilton's talk in C216) Coding theory and cryptology/number theory will be on Sunday the 25th, with more cryptology/number theory on Monday the 26th. Prof Hilton will speak Monday night the 26th. This conference is generously funded by the NSA. No registration fee for attending the conference but if you plan to attend, please email David Joyner at wdj@nadn.navy.mil or call at (410)293-6738.
    Main Speakers:
    Professor Peter Hilton
    SUNY, Binghamton and Univ. of Central Florida
    Time : 7-8pm, Monday Oct 26 Title:
    Breaking high grade German ciphers in WWII; working with Alan Turing
    Abstract : During World War II a team of mathematicians, and young would-be mathematicians, worked round the clock to break the highest grade German military and diplomatic codes. They were astonishingly successful, and as a result provided the allied war machine with an unprecedentedly complete picture of the enemy plans and dispositions. I was fortunate to be chosen to be a member of that team. In this talk I describe our work and the atmosphere in which it was conducted. I will further give a description of the special contribution of the famous logician Alan Turing, whom I knew well for the last 10 years of his tragically short life.

    57. The Future Of Cryptography
    The Future of cryptography. Dorothy E. Denning Georgetown University. A new paradigmof cryptography, key escrow, is emerging and gaining acceptance in industry.
    http://www.cosc.georgetown.edu/~denning/crypto/Future.html
    The Future of Cryptography
    Dorothy E. Denning
    Georgetown University Revised January 6, 1996 A few years ago, the phrase crypto anarchy was coined to suggest the impending arrival of a Brave New World in which governments, as we know them, have crumbled, disappeared, and been replaced by virtual communities of individuals doing as they wish without interference. Proponents argue that crypto anarchy is the inevitable and highly desirable outcome of the release of public key cryptography into the world. With this technology, they say, it will be impossible for governments to control information, compile dossiers, conduct wiretaps, regulate economic arrangements, and even collect taxes. Individuals will be liberated from coercion by their physical neighbors and by governments. This view has been argued recently by Tim May [1]. Behind the anarchists' vision is a belief that a guarantee of absolute privacy and anonymous transactions would make for a civil society based on a libertarian free market. They ally themselves with Jefferson and Hayek who would be horrified at the suggestion that a society with no government control would be either civil or free. Adam Ferguson once said "Liberty or Freedom is not, as the origin of the name may seem to imply, an exemption from all restraints, but rather the most effectual applications of every just restraint to all members of a free society whether they be magistrates or subjects." Hayek opens The Fatal Conceit, The Errors of Socialism

    58. An Overview Of Cryptography
    An Overview of cryptography. Gary C. Kessler May 1998 (5 May 2004). A background information. 2. THE PURPOSE OF cryptography. cryptography
    http://www.garykessler.net/library/crypto.html
    An Overview of Cryptography
    Gary C. Kessler
    May 1998
    (5 May 2004)
    A much shorter, edited version of this paper appears in the 1999 Edition of Handbook on Local Area Networks , published by Auerbach in September 1998. Since that time, this article has taken on a life of its own...
    CONTENTS
    FIGURES
  • Three types of cryptography: secret-key, public key, and hash function.
  • Sample application of the three cryptographic techniques for secure communication.
  • Kerberos architecture.
  • Sample entries in Unix/Linux password files. ...
  • AES pseudocode.
    TABLES
  • Minimum Key Lengths for Symmetric Ciphers.
  • Contents of an X.509 V3 Certificate.
  • Some Secure Communications Protocols, Cryptography Systems, and Their Primary Application(s).
  • ECC and RSA Key Comparison.
    1. INTRODUCTION
    Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography, which is the focus of this chapter. But it is important to note that while cryptography is
  • 59. Linux 2.4: Next Generation Kernel Security
    Selective privileges (capabilities), cryptography, random number devices.
    http://www.linuxsecurity.com/feature_stories/kernel-24-security.html
    Mac OS fix fails to plug security hole
    May 26
    Secure programmer: Minimizing privileges

    May 26
    The biggest spammer on the Net? Comcast?

    May 26
    Today's Term certificate revocation list (CRL) A data structure that enumerates digital certificates that have been invalidated by their issuer prior to when they were scheduled to expire. (See: certificate expiration, X.509 certificate revocation list.) ... Today's Tip Using sudo
    sudo is a mechanism of providing root prileges to an ordinary user Features Linux 2.4: Next Generation Kernel Security By Dave Wreski
    Page [1]: Introduction to Capabilities
    : Open Source Cryptography and Kernel Devices
    [Printer Friendly]
    This document outlines the kernel security improvements that have been made in the 2.4 kernel. A number of significant improvements including cryptography and access control make 2.4 a serious contender for secure corporate environments as well as private virtual networking.
    One of the most obvious and significant improvements in the 2.4 kernel is the packet filtering capabilities . However, there are a number of other improvements that make Linux one of the most secure operating systems available. Capabilities: Removing Dependance on "root" As you know, the "root" user normally has complete control over all functions of a Linux box. Binding to a privileged port, loading kernel modules, and managing filesystems are examples of things that typically can only be done by root. If a regular user needed to run the "ping" command, for example, it was necessary to make it run with the privileges of the root user. The ping binary needs root privileges in order to open a raw socket (an operation managed by the kernel) to create the necessary ICMP packet for the echo request.

    60. GILC -- Cryptography And Liberty
    The 1999 update of this report is now available. cryptography AND LIBERTY 1998. LisaKamm created the HTML version of the Report. The Importance of cryptography.
    http://www.gilc.org/crypto/crypto-survey.html
    The 1999 update of this report is now available
    CRYPTOGRAPHY AND LIBERTY 1998
    AN INTERNATIONAL SURVEY OF ENCRYPTION POLICY February 1998

    Global Internet Liberty Campaign
    http://www.gilc.org/ The Importance of Cryptography Encryption and Human Rights GILC and Encryption ... Index by Country
    Acknowledgements
    This Report was made possible by a grant from the Open Society Institute ( http://www.soros.org/osiny.html ). EPIC Senior Fellow Wayne Madsen was the principal researcher and writer. Members of the Global Internet Liberty Campaign provided assistance. Lisa Kamm created the HTML version of the Report.
    The Importance of Cryptography
    Emerging computer and communications technologies are radically altering the ways in which we communicate and exchange information. Along with the speed, efficiency, and cost-saving benefits of the "digital revolution" come new challenges to the security and privacy of communications and information traversing the global communications infrastructure. Governmental regulation of cryptographic security techniques endangers personal privacy. Encryption ensures the confidentiality of personal records, such as medical information, personal financial data, and electronic mail. In a networked environment, such information is increasingly at risk of theft or misuse. In their "Resolution in Support of the Freedom to Use Cryptography," members of the Global Internet Liberty Campaign (GILC) noted that "the use of cryptography implicates human rights and matters of personal liberty that affect individuals around the world" and that "the privacy of communication is explicitly protected by Article 12 of the Universal Declaration of Human Rights, Article 17 of the International Covenant on Civil and Political Rights, and national law." See Resolution in Support of the Freedom to Use Cryptography, September 25, 1996 (Appendix B).

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 3     41-60 of 176    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20

    free hit counter