Geometry.Net - the online learning center
Home  - Science - Cryptography
e99.com Bookstore
  
Images 
Newsgroups
Page 4     61-80 of 176    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Cryptography:     more books (100)
  1. Algebraic Geometry in Coding Theory and Cryptography by Harald Niederreiter, Chaoping Xing, 2009-09-21
  2. Cryptography & Network Security (McGraw-Hill Forouzan Networking) by Behrouz Forouzan, 2007-02-28
  3. A Course in Number Theory and Cryptography (Graduate Texts in Mathematics) by Neal Koblitz, 1994-09-02
  4. An Introduction to Cryptography, Second Edition (Discrete Mathematics and Its Applications) by Richard A. Mollin, 2006-09-18
  5. Elementary Number Theory, Cryptography and Codes (Universitext) by M. Welleda Baldoni, Ciro Ciliberto, et all 2008-12-09
  6. Contemporary Cryptography (Artech House Computer Security503) by Rolf Oppliger, 2005-04-30
  7. Introduction to Cryptography with Java Applets by David Bishop, 2002-12
  8. Cryptography for Developers by Tom St Denis, 2007-01-15
  9. .NET Security and Cryptography by Peter Thorsteinson, G. Gnana Arun Ganesh, 2003-08-28
  10. Cryptography for Visual Basic(r) : A Programmer's Guide to the Microsoft(r) CryptoAPI by Richard Bondi, 2000-09-01
  11. Protecting Information: From Classical Error Correction to Quantum Cryptography by Susan Loepp, William Wootters, 2006-07-31
  12. Finite Fields: Theory and Computation: The Meeting Point of Number Theory, Computer Science, Coding Theory and Cryptography (Mathematics and Its Applications) by Igor Shparlinski, 2010-11-02
  13. Coding Theory and Cryptography: The Essentials, Second Edition (Pure and Applied Mathematics) by D.C. Hankerson, Gary Hoffman, et all 2000-08-04
  14. Foundations of Cryptography: A Primer (Foundations and Trends in Theoretical Computer Science,) by Oded Goldreich, 2005-04-05

61. ID Quantique: Cryptography, Photon Counting, Random Numbers
Site Of id Quantique, Inc. Products include a quantum random number generator,and a quantum cryptography system.
http://www.idquantique.com

Home
Company Products
Quantum Random Number Generator

Quantum Key Distribution

Single Photon Detection Module

Contact
NEWS VISIT US AT CLEO 2004
See us at Cleo 2004 in San Francisco (May 18-20) on booth T3 and win a free Quantis quantum random number generator.
If you want an appointment, please contact us: cleo@idquantique.com EUROPEAN SCIENTISTS AND COMPANIES TEAM UP AGAINST EAVESDROPPING AND ESPIONAGE
EU Project aimed at the development of an entirely secure communications network heralds a new era for computer network security. Read more... TRUE RANDOM NUMBERS ON REQUEST
University of Geneva and the company id Quantique team to launch the first web site offering the possibility to download random numbers from quantum origin... See www.randomnumbers.info

62. GILC Crypto Policy Page
cryptography. Top News. New year. GILC Statements and Reports. cryptographyand Liberty An International Survey of Encryption Policy.
http://www.gilc.org/crypto/
G LOBAL
I NTERNET L IBERTY C AMPAIGN
N EWS
GILC Actions Presswire
I SSUES
Free Speech Privacy Cryptography Access
R ESOURCES
GILC Alert Mailing List GILC Events
A BOUT GILC
Principles Members Mail GILC Home Page ...
European Mirror
Cryptography Top News
  • New International Survey Finds Few Controls. The 1999 Cryptography and Liberty report reveals that few countries worldwide now restrict encryption technologies and that there has been more relaxation of restrictions on encryption by major industrialized countries in the previous year.
GILC Statements and Reports

63. Cryptography - An Overview
An Overview. Introduction. Techniques. Algorithms. Implementations.Algorithms. Java Applets. Applications. Research. Standards. Papers.Attacks.
http://www.hack.gr/users/dij/crypto/
An Overview Introduction Techniques Algorithms Implementations Algorithms Java Applets Applications Research Standards Papers Attacks More ... News Links About

64. OpenBSD
Multiplatform UltraSecure Operating System. Focus portability, standardization, correctness, security, cryptography.
http://www.OpenBSD.org/
Language: [en]
[cs]
[de] [es] [fr] ... [zh-tw]
About OpenBSD
Project Goals

Donations

Hardware Platforms

Daily Changelog
...
Commercial Support

Getting OpenBSD
CDs/T-shirts/Posters

FTPing Releases
Installing OpenBSD Source by AnonCVS ... Source by Web OpenBSD Resources OpenBSD FAQ Manual Pages Patches How to Report Bugs ... OpenBSD Journal Only one remote hole in the default install, in more than 8 years! The OpenBSD project produces a FREE , multi-platform 4.4BSD-based UNIX-like operating system. Our efforts emphasize portability, standardization, correctness, proactive security and integrated cryptography . OpenBSD supports binary emulation of most programs from SVR4 (Solaris), FreeBSD, Linux, BSD/OS, SunOS and HP-UX. OpenBSD is freely available from our FTP sites, and also available in an inexpensive 3-CD set. The current release is OpenBSD 3.5 which started shipping May 1, 2004. The CDs (and Shirts) can be ordered... OpenBSD is developed by volunteers. The project funds development and releases by selling CDs and T-shirts , as well as receiving donations. Organizations and individuals donate and thus ensure that OpenBSD will continue to exist, and will remain

65. Cryptography - An Overview
Introduction. What is. Basics. Terminology. Techniques. Public Key cryptography.Block Ciphers. Stream Ciphers. Hash Functions. Other Techniques. New Technologies.
http://www.hack.gr/users/dij/crypto/overview/
An Overview Introduction What is Basics Terminology Techniques Public Key Cryptography Block Ciphers Stream Ciphers Hash Functions ... New Technologies Algorithms (quick view) RSA DSA Diffie-Hellman Other Public-Key Encryption and Signature Algorithms ... MD2, MD4, MD5 and other hash functions

66. WCC 99
Paris, 1114 January 1999
http://www-rocq.inria.fr/codes/WCC99/
WCC 99 Workshop on Coding and Cryptography January 11-14, 1999, PARIS (France)
The workshop will be held in the "Cercle Militaire" - a high standard hotel located in Paris, at walking distance from the Avenue des Champs Élysées. It is hosted by INRIA and the "Centre de Recherche des Écoles de Coëtquidan"
Sponsors
Service Central de la Sécurité des Systèmes d'Information Délégation Générale pour l'Armement Thomson-CSF
The official languages are English an French.

UP-TO-DATE INFORMATION
PRELIMINARY PROGRAM
REGISTRATION FORM
Postscript ( English or French version) LaTeX2e source ( English or French version)

HOTELS INFORMATION
LIST OF ACCEPTED PAPERS
You can see there the Call for papers in an html version; you can get the ascii and the postscript ( english french If you need to contact us, see the Contact Information
How to come to the workshop ?
Accomodation and Meals You can find here some information on Paris, with interesting links for your leisure. You can look at the web site of Météo France to know the weather forecast. Some general information about the registration
Back to the Home Page of the CODES' project.

67. Web Pages Of Interest To Cryptography Researchers
Web pages of interest to cryptography researchers. Quantum cryptographyat Los Alamos; EISS (Karlsruhe, Germany); UCL Crypto Group; SCSI;
http://www.swcp.com/~mccurley/cryptographers/cryptographers.html
Web pages of interest to cryptography researchers
This page started out as a list of cryptography researchers' home pages, but has been expanded to include links to things that are of interest to people involved in cryptography and security research . No attempt has been made to rank them, and suggestions for additions or corrections are welcome. Send them to the author at mccurley at swcp.com
Individuals
Groups and Projects

68. An Introduction To Cryptography
Richard A. Mollin. Intended for a onesemester introductory undergraduate course in cryptography. Covers symmetric and public key systems with chapters on advanced topics.
http://www.math.ucalgary.ca/~ramollin/cryptopref.html
AN INTRODUCTION TO CRYPTOGRAPHY
ISBN#: 1-58488-127-5
Reviews
"This is a great book! It can be used in many ways: for a university course at one extreme, and as selective light reading for pleasure at the other. The author's enthusiasm carries the reader along clearly and easily, spilling over to scores of fascinating, beautifully written footnotes, which include more than fifty mini-biographies." "...this book is excellent and highly recommended." Short Book Reviews, Vol. 21, No. 2, August, 2001
Order electronically:
For those who have a copy, here is an online updates page
TABLE OF CONTENTS:
BRIEF OVERVIEW:
Chapter Five on factoring is the first of two optional chapters. Section One involves an illustrated description of three factoring algorithms: Pollard's p-1 method, the Brillhart-Morrison continued fraction algorithm, and the quadratic sieve. A brief history of how the work of Legendre, Euler, Kraitchik and Lehmer led to the development of these algorithms is also provided, as is a discussion of how the notions can be generalized. This motivates the topic of Section Two, which begins with an illustration of how Pollard's original idea for factoring with cubic integers led to the development of the number field sieve. Then a detailed description of the special number field sieve is given (with the factorization of the ninth Fermat number as an illustration) along with a discussion of its complexity in relation to the general number field sieve.
Features of This Text

69. Kluwer Academic Publishers - Designs, Codes And Cryptography

http://www.kluweronline.com/issn/0925-1022/contents
This web page uses frames, but your browser doesn't support them.

70. Kluwer Academic Publishers - Designs, Codes And Cryptography

http://www.kluweronline.com/issn/0925-1022/current
This web page uses frames, but your browser doesn't support them.

71. Information On Cryptography
There is much overlap between network security and cryptography; seealso my web page with information on computer security. Links
http://http.cs.berkeley.edu/~daw/crypto.html
There is much overlap between network security and cryptography; see also my web page with information on computer security
Links to some cryptography people 's home pages are available.
Warning : I no longer update this link farm.
A quick skip index:
Link farms

72. Three Types Of Simple Cryptography
This is a Visual Basic (versions 5 and 6) crytography project written by Alexander Levakov. It functions as an excellent crytography programming tutorial.
http://www.freevbcode.com/ShowCode.Asp?ID=1164

73. Introduction To Public-Key Cryptography

http://developer.netscape.com/docs/manuals/security/pkin/
To view this page, your browser must support frames. Download

74. Introduction To Public-Key Cryptography
Introduction to PublicKey cryptography. Public protocol. This documentintroduces the basic concepts of public-key cryptography.
http://developer.netscape.com/docs/manuals/security/pkin/contents.htm
Introduction to Public-Key Cryptography
Internet Security Issues
Encryption and Decryption

Digital Signatures

Certificates and Authentication
...
Managing Certificates
For more information on these topics and other aspects of cryptography, see Security Resources For an overview of SSL, see Introduction to SSL
Internet Security Issues
All communication over the Internet uses the Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP allows information to be sent from one computer to another through a variety of intermediate computers and separate networks before it reaches its destination The great flexibility of TCP/IP has led to its worldwide acceptance as the basic Internet and intranet communications protocol. At the same time, the fact that TCP/IP allows information to pass through intermediate computers makes it possible for a third party to interfere with communications in the following ways:
  • Eavesdropping. Information remains intact, but its privacy is compromised. For example, someone could learn your credit card number, record a sensitive conversation, or intercept classified information Tampering.

75. Efg's Reference Library: Delphi Cryptography And Multiple-Precision Arithmetic
Comprehensive compilation of cryptography and highprecision math resources for Delphi (mirrored on Borland's website). Computer lab also features dozens of practical mathematics and graphics projects. Delphi source code with quality annotations.
http://www.efg2.com/Lab/Library/Delphi/MathFunctions/Cryptography.htm
Delphi Math Functions Cryptography and Multiple-Precision Arithmetic Contents Cryptography Multiple-Precision Arithmetic Also see Cryptography section of efg's Mathematics Page Cryptography
Federation of American Scientists: Cryptology Links

Everything to hide: Knowing the right cryptographic algorithm

Dr. Dobb's Security Page
Category Source(s) Anti-Cracking FAQ from Richey's Delphi-Box
http://www.inner-smile.com/nocrack.htm
Easy to use, fast and flexible components implementing most popular algorithms to encrypt/decrypt data and calculate digests. Package includes random and prime numbers generators up to 4096 bit. All cryptography components can generate keys, load and save them to file. All but RSA support ECB. CBC, CFB and OFB modes, ciphering in-place or into internal buffers.
http://delphi.icm.edu.pl/ftp/d50share/ASCryptoKit5.zip
Block Ciphers A block cipher class hierarchy. Currently includes TDESCipher and TBlowfishCipher, with more to come soon. The ciphers all form a hierarchy, descending from TBlockCipher, allowing for polymorphic instantiation of any cipher you choose. The DES implementation has been heavily optimized with a lot of help from Bob Lee. It encrypts 4.2 megs/sec on my Pentium II. Blowfish has been similarly optimized, encrypting 6.5 megs/sec.
www.csd.net/~daves/delphi/BlockCiphers.zip

76. Cryptography In OpenBSD
cryptography. Index Why do we ship cryptography?. OpenSSH. Why do we ship cryptography?In three words because we can. The OpenBSD project is based in Canada.
http://www.openbsd.org/crypto.html
"The mantra of any good security engineer is: "Security is not a product, but a process." It's more than designing strong cryptography into a system; it's designing the entire system such that all security measures, including cryptography, work together."
Bruce Schneier, author of "Applied Cryptography".
Cryptography
Index
Why do we ship cryptography?

OpenSSH

Pseudo Random Number Generators
(PRNG): ARC4, ...
Cryptographic Hash Functions

Cryptographic Transforms
: DES, Blowfish, ...
Cryptographic Hardware support

International Cryptographers wanted

Further Reading
Why do we ship cryptography?
In three words: because we can The OpenBSD project is based in Canada. The Export Control List of Canada places no significant restriction on the export of cryptographic software, and is even more explicit about the free export of freely-available cryptographic software. Marc Plumb has done some research to test the cryptographic laws Hence the OpenBSD project has embedded cryptography into numerous places in the operating system. We require that the cryptographic software we use be freely available and with good licenses . We do not directly use cryptography with nasty patents. We also require that such software is from countries with useful export licenses because we do not wish to break the laws of any country. The cryptographic software components which we use currently were written in Argentina, Australia, Canada, Germany, Greece, Norway, and Sweden.

77. Certificate Authorities For Server-Gated Cryptography
List of certificate authorities issuing ServerGated cryptography certificates. (Microsoft)
http://www.microsoft.com/security/tech/sgc/CAs.asp

78. Bibliography Of Quantum Cryptography
A Bibliography of Quantum cryptography. by Gilles Brassard. Recent paperson Quantum cryptography. JMO Special Issue Quantum Communication.
http://www.cs.mcgill.ca/~crepeau/CRYPTO/Biblio-QC.html
A Bibliography of Quantum Cryptography
by Gilles Brassard Département IRO, Université de Montréal.
C.P. 6128, Succursale "Centre-Ville"
Montréal (Québec) Canada H3C 3J7
The original PostScript file from Gilles Brassard - provided by Edith Stoeveken -
was converted to ASCII and reformatted in HTML; Sept 2 1994, Stephan Kaufmann.
HTTP pointers to DVI files added by Claude Crépeau, March 6 1995.
Multiple file format added July 21st 1996 by Claude.
FORMATS: D = DVI, P = POSTSCRIPT, G = POSTSCRIPT+GZIP
Abstract
This paper provides an extensive annotated bibliography of papers that have been written on quantum cryptography and related topics.
1. Introduction
In the past few years, a remarkable surge of interest in the international scientific and industrial community has propelled quantum cryptography into mainstream computer science and physics. Furthermore, quantum cryptography is becoming increasingly practical at a fast pace. The first quantum key distribution prototype [2] worked over a distance of 32 centimetres in 1989. Two additional experimental demonstrations have been set up since, which work over significant lengths of optical fibre [13, 14]. The purpose of this work is to provide an extensive bibliography of most papers ever written on quantum cryptography, including some unpublished papers. In addition, a limited selection of key papers that describe techniques of crucial importance to quantum cryptography, such as privacy amplification [63, 73], is included. The papers are listed in chronological order within each section.

79. IMA: Cryptography And Coding
All aspects of the theory and applications of cryptography and coding. Royal Agricultural College, Cirencester; 1719 December 2001.
http://www.ima.org.uk/mathematics/confcryptography.htm
News
Top Stories

Information

Mathematics Conferences Publications
Interest Groups

Careers
...
Links to other sites

The Institute
About Us

Membership

Mathematics Today
Branches ... Contact Us Site Info Downloads Page reviewed: 09/8/01 Cryptography and Coding Page 1 Cryptography and Coding Page 2 Instructions to Authors 17-19 December 2001 Royal Agricultural College, Cirencester, UK Co-sponsored by the IEE and the IEEE UKRI Communications Chapter This event will meet the requirements of the IMA Continuing Professional Development Scheme. Further information from Belinda Morris The mathematical theory and practice of cryptography and coding underpins the provision of effective security and reliability for data communication, processing and storage. Theoretical and implementational advances in the fields of cryptography and coding are therefore a key factor in facilitating the growth of data communications and data networks of various types. Thus, this Eighth International Conference in an established and successful IMA series on the theme of "Cryptography and Coding" is both timely and relevant. A theme for this conference will be presentations on views of the future of coding and cryptography by a number of invited researchers.

80. Cryptography Page Moved
The Trinity College Computer Science cryptography Website has moved tohttp//starbase.trincoll.edu/~crypto/ . This page will transfer
http://www.trincoll.edu/depts/cpsc/cryptography/
The Trinity College Computer Science Cryptography Website has moved to http://starbase.trincoll.edu/~crypto/
. This page will transfer you there in a couple of seconds.

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Page 4     61-80 of 176    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20

free hit counter