Geometry.Net - the online learning center
Home  - Science - Cryptography
e99.com Bookstore
  
Images 
Newsgroups
Page 5     81-100 of 176    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Cryptography:     more books (100)
  1. Cryptography in the Database: The Last Line of Defense by Kevin Kenan, 2005-10-29
  2. Cryptography and E-Commerce: A Wiley Tech Brief by Jon C. Graff, 2000-12-11
  3. Implementing SSL/TLS Using Cryptography and PKI by Joshua Davies, 2011-02-08
  4. Handbook of Financial Cryptography and Security (Chapman & Hall/CRC Cryptography and Network Security Series)
  5. Access Control, Security, and Trust: A Logical Approach (Chapman & Hall/CRC Cryptography and Network Security Series) by Shiu-Kai Chin, Susan Beth Older, 2010-07-26
  6. Codes: An Introduction to Information Communication and Cryptography (Springer Undergraduate Mathematics Series) by Norman L. Biggs, 2008-08-08
  7. Theoretical Computer Science: Introduction to Automata, Computability, Complexity, Algorithmics, Randomization, Communication, and Cryptography (Texts in Theoretical Computer Science. An EATCS Series) by Juraj Hromkovic, 2010-11-02
  8. Cryptography: An Introduction by Nigel Smart, 2004-12-30
  9. Algorithmic Number Theory: Lattices, Number Fields, Curves and Cryptography (Mathematical Sciences Research Institute Publications)
  10. Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series) (v. 2)
  11. Practical Signcryption (Information Security and Cryptography)
  12. Public Key Cryptography - PKC 2005: 8th International Workshop on Theory and Practice in Public Key Cryptography (Lecture Notes in Computer Science / Security and Cryptology)
  13. Algebraic Aspects of Cryptography (Algorithms and Computation in Mathematics) by Neal Koblitz, 2010-11-30
  14. Cryptography: An Introduction to Computer Security (Advances in Computer Science Series) by Jennifer Seberry, Josef Pieprzyk, 1989-09

81. Arimta Crypto
cryptography component with focus on interoperability. Supports MD5 hashing and AES (Rijndael) encryption / decryption with custom IV, CBC mode, and PKCS7 padding. Processes data in Hex, Base64, Unicode string, or binary formats. By Arimta Technology. Component, Commercial
http://www.arimta.com/?go=Crypto

82. Document Moved
Document Moved. The document formerly at this location has beenmoved to http//www.trincoll.edu/depts/cpsc/cryptography/.
http://www.trincoll.edu/~cpsc/cryptography/
Document Moved
The document formerly at this location has been moved to http://www.trincoll.edu/depts/cpsc/cryptography/

83. Page Not Found
Toolkits for SSL, general cryptography, and PKI. Commercial
http://www.rsasecurity.com/products/bsafe/
We're sorry, but due to a recent renovation of the RSA Security site, many of our page URLs have changed. In a few seconds, you will be redirected to the new URL for the page you requested. If you have arrived at this page via a bookmark in your web browser, please take a moment to update it to the new URL. We're sorry for any inconvenience this may have caused. This document has moved to:

84. Cryptology Pointers
Pseudorandom Functions Boolean functions. PublicKey cryptography, PKCBased on Some Special Mathematical Structures. Public-Key Encryption
http://www.tcs.hut.fi/~helger/crypto/
Top links IACR homepage IACR ePrint server
Cryptology pointers
Starting points Literature Newsgroups FAQs ... Conferences, Workshops, Seminars Groups and individuals working on crypto Seminars, Courses... University Sites Corporate Research Groups Cryptographer homepages ... Research and Education (General) Basic Symmetric Primitives Block ciphers AES Stream ciphers Hand Ciphers ... Public-Key Cryptography PKC Based on Some Special Mathematical Structures Public-Key Encryption Theory of PKC Deniable Encryption Threshold Encryption ... Class Groups Specific Cryptographic Schemes Authentication, Identification and Key Exchange Incremental Cryptography Signature Schemes Identification Schemes ... Cryptographic Protocols Zero-knowledge, MPC and Secret Sharing Commitment Oblivious Transfer Private Information Retrieval Pseudorandom Generators ... Secret Sharing Application Protocols (Financial Cryptography) Application Protocols (Everything Else) Digital Cash Auctions Contract Signing/Fair Exchange Traitor Tracing and Broacast Encryption ... Privacy-Preserving Data mining Infrastructure Protocols Practical Aspects Time-Stamping Public Key Infrastructure Countermeasures to DoS ... Patents Formal Methods, Various Security Models

85. [quant-ph/0101098] Quantum Cryptography
A recent overview of quantum cryptography.
http://arxiv.org/abs/quant-ph/0101098
Quantum Physics, abstract
quant-ph/0101098
From: Gregoire Ribordy [ view email ] Date ( ): Fri, 19 Jan 2001 16:35:48 GMT (769kb) Date (revised v2): Tue, 18 Sep 2001 19:31:51 GMT (895kb)
Quantum Cryptography
Authors: Nicolas Gisin Wolfgang Tittel Hugo Zbinden
Comments: 55 pages, 32 figures; to appear in Reviews of Modern Physics
Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological issues.
Full-text: PostScript PDF , or Other formats
References and citations for this submission:
SLAC-SPIRES HEP
(refers to , cited by , arXiv reformatted);
CiteBase
(autonomous citation navigation and analysis) Which authors of this paper are endorsers?
Links to: arXiv quant-ph find abs

86. Cryptography Resources
cryptography Resources. Indexes. Other page. International cryptographyby Tatu Ylönen and Tomi Salo has good introductory material.
http://www.scs.carleton.ca/~csgs/resources/crypt.html
Cryptography
Resources
Indexes
Other related indexes include Ronald L. Rivest's Cryptography and Security page, Crypto Log by Robert G. Flower, Francis Litterio's Cryptography: The Study of Encryption , Bennet Yee's Security Related Net-pointers , Quadralay Corporation's Cryptography Archive , a Security and Cryptography page by Michael Waidner, and Vince Cate's Cryptorebel/Cypherpunk page. International Cryptography Related general subject-oriented indexes include Yahoo's Security and Encryption page.
Centres
Crypto Group Information Security and Cryptography Research Group , the NetBill Electronic Commerce Project Laboratory for Theoretical and Quantum Computing . the Computer Security Division of the Information Technology Laboratory of NIST, the Computer Security and Industrial Cryptography (COSIC) group at Katoleike Universiteit Leuven, Cryptography and Computer Security Service Cryptography and Information Security (CIS) group at MIT, and Cryptography and Data Security at Worcester Polytechnic Institute. The premier organization for cryptologists and their ilk is the International Association for Cryptologic Research . The IETF sponsors the IP Security Working Group Some companies that are involved in cryptography include DigiCash RSA Laboratories MasterCard Secure Electronic Transactions , and IBM's Network Security Projects If you think that secret-mongers actually advance the cause of science then you might actually care about the Canadian Communications Security Establishment , and the U.S.

87. MCCCC SECOND ANNOUNCEMENT
Illinois State University, Normal, Illinois, USA; 1416 October 1999. Abstracts (DVI,PS).
http://www.math.ilstu.edu/~saad/MCCCC.html
FINAL ANNOUNCEMENT (Updated 10.6.99) Thirteenth Midwestern Conference on
COMBINATORICS, CRYPTOGRAPHY, AND COMPUTING
Thursday, Oct. 14 - Saturday, Oct. 16, 1999
at
Illinois State University, Normal, Illinois You are warmly invited to participate in the Thirteenth Midwestern Conference on Combinatorics, Cryptography, and Computing to be held October 14-16, 1999 at Illinois State University, Normal, Illinois. The aim is to bring together researchers in all areas of pure and applied combinatorics, including graph theory, design theory, enumeration, cryptography and combinatorial computing. The conference will feature six invited one-hour lectures. There will also be sessions for 20-minute contributed papers.
INVITED SPEAKERS Joseph Gallian , University of Minnesota-Duluth, Graph Labelings
Jeannette Janssen, Dalhousie University, List-Colourings of Edges and the Asymptotics of Vizing's Conjecture
Rolf Rees, Memorial University of Newfoundland, A Survey of Results on Mandatory Representation Designs
Christopher Rodger
, Auburn University

88. Cryptography - Home
The Microsoft Research cryptography Group studies and develops methods to enhanceuser and system privacy and security. Search MSR. Home. cryptography.
http://research.microsoft.com/crypto/
Search MSR Advanced Search
Research Projects Topics People Publications News MSR News Press Kit Press Resources Feature Stories Collaboration Community Conferences Lectures Online University Relations About MSR Jobs Visiting MSR Labs Contact Us ... Home Cryptography
Overview Group Member Photos People Projects Selected Publications Overview Cryptography – from the Greek: hidden writing - is the ancient science of encoding messages so that only the sender and receiver can understand them. Cryptography is now available to everyone thanks to the development of modern computers, which can perform more mathematical operations in a second than a human being could do in a lifetime. An ordinary PC can produce codes of such complexity that the most powerful supercomputer using the best available attack algorithms would not break them in a million years. Cryptography is used to secure telephone, Internet, and email communication and to protect software and other digital property. It may soon usher in a new age of money with electronic commerce. The Cryptography and Anti-Piracy group within Microsoft Research serves multiple roles:
  • Researching new cryptographic methods and applications.

89. Mod_ssl: The Apache Interface To OpenSSL
The module provides strong cryptography for the Apache 1.3 webserver via SSL and TLS protocols, it was developed using OpenSSL, which is based on SSLeay. Free / Open Source (Ralf Engelschall, Ben Laurie)
http://www.modssl.org/
Current Version: for Apache
mod_ssl combines the flexibility of
Apache with the security of OpenSSL.
his module provides strong cryptography for the Apache 1.3 webserver via the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols by the help of the Open Source SSL/TLS toolkit OpenSSL , which is based on SSLeay from Eric A. Young and Tim J. Hudson The mod_ssl package was created in April 1998 by Ralf S. Engelschall and was originally derived from software developed by Ben Laurie for use in the Apache-SSL HTTP server project. The mod_ssl package is licensed under a BSD-style license, which basically means that you are free to get and use it for commercial and non-commercial purposes. [ more... For the impatient:
You are wondering how popular mod_ssl currently is? Look at the statistic page
You want the latest source code? Fetch the distribution tarball
You want documentation? Read the user manual
You have suggestions or problems? First read the FAQ , then perhaps send a bug report
You want be always up-to-date? Join the mod_ssl mailing lists
You want an official Year 2000 statement? Read the

90. Theory Of Cryptography Library
Theory of cryptography Library. This library is no longer accepting new submissions. Thisweb page provides access to recent work on Theory of cryptography.
http://philby.ucsd.edu/cryptolib/
Theory of Cryptography Library
This library is no longer accepting new submissions. New submissions should be sent instead to IACR's Cryptology ePrint Archive . This library will remain available, so that its existing contents can still be accessed, until such time as it is possible to transfer the entire contents to the above-mentioned archive. The transfer in question will be done in such a way that the record numbers are preserved, so that references to records here made in the literature are still meaningful and can be used to locate the papers in question. This web page provides access to recent work on Theory of Cryptography. Work has been placed here by the authors and did not undergo any refereeing process other than verifying that the work seems to be within scope and of some interest to the subscribers. The e-mail for operational issues is cryptolib@philby.ucsd.edu

91. Elliptic Curves And Their Applications To Cryptography: An Introduction
Web text by Andreas Enge.
http://www.lix.polytechnique.fr/Labo/Andreas.Enge/buch/buch/buch.html
Next: Contents
Elliptic Curves and Their
Applications to Cryptography:
An Introduction
Andreas Enge
Date: September 1999

Andreas Enge

92. Index Of Crypto Papers Available Online
Subscribe. Current Issue. Back Issues. cryptography and Computer Security Resources.Contact Information. Index of cryptography Papers Available Online.
http://www.schneier.com/biblio/
Bruce Schneier Home Books Beyond Fear Other Books ... Contact Information
Index of Cryptography Papers Available Online
The index currently contains papers.
Papers sorted by year: unknown Papers sorted by first author: A B C D ... T U V W X Y ... Z Papers sorted by any author: A B C D ... T U V W X Y ... All papers, by first author, in a single file (for keyword searching with your browser's search command) Researchers: can't find your paper in the index? Add a new paper (or correct an existing one) Crypto-Gram Newsletter A free monthly e-mail newsletter on general and computer security.
read more
New Book Beyond Fear: Thinking Sensibly About Security in an Uncertain World
read more

93. Journal Of Discrete Mathematical Sciencies & Cryptography
(Taru) Author information, recent tables of contents (PDF).
http://www.tarupublications.com/jdmsc.html
Your browser doesn't support frames.

94. Security Pitfalls In Cryptography
Security Pitfalls in cryptography. by Bruce Schneier. Attacks Against thecryptography. Sometimes, products even get the cryptography wrong.
http://www.schneier.com/essay-pitfalls.html
Bruce Schneier Home Books Beyond Fear Other Books ... Contact Information
Security Pitfalls in Cryptography
by Bruce Schneier Cryptography Consultant
Counterpane Internet Security, Inc.

e-mail: schneier@counterpane.com You can download this essay in PDF (Acrobat) format or as a PalmPilot DOC
This essay is also available in a French translation. Magazine articles like to describe cryptography products in terms of algorithms and key length. Algorithms make good sound bites: they can be explained in a few words and they're easy to compare with one another. "128-bit keys mean good security." "Triple-DES means good security." "40-bit keys mean weak security." "2048-bit RSA is better than 1024-bit RSA." But reality isn't that simple. Longer keys don't always mean more security. Compare the cryptographic algorithm to the lock on your front door. Most door locks have four metal pins, each of which can be in one of ten positions. A key sets the pins in a particular configuration. If the key aligns them all correctly, then the lock opens. So there are only 10,000 possible keys, and a burglar willing to try all 10,000 is guaranteed to break into your house. But an improved lock with ten pins, making 10 billion possible keys, probably won't make your house more secure. Burglars don't try every possible key (a brute-force attack); most aren't even clever enough to pick the lock (a cryptographic attack against the algorithm). They smash windows, kick in doors, disguise themselves as policemen, or rob keyholders at gunpoint. One ring of art thieves in California defeated home security systems by taking a chainsaw to the house walls. Better locks don't help against these attacks.

95. AMS Special Session On Cryptography And Number Theory
AMS Special Session. Ohio State University, Columbus, Ohio; 2123 September 2001.
http://euclid.butler.edu/~sorenson/ams.html
AMS Special Session on
Cryptography and Computational and Algorithmic Number Theory
Ohio State University, Columbus Ohio
September 21-23, 2001
Pictures!
Announcements
Because of the recent tragic events in New York, Washington, and Pennsylvania, several of our confirmed speakers have had to cancel. The AMS has decided to go forward with the meetings, and so shall we: "We plan to go ahead with the meeting at this time and we will dedicate the meeting to mathematicians, their friends and families who have suffered from the horrible events of Tuesday 11th September."
Organizers
Eric Bach , University of Wisconsin at Madison, bach@cs.wisc.edu
Jon Sorenson
, Butler University, sorenson@butler.edu
List of Speakers
Daniel J. Bernstein, University of Illinois at Chicago
Larry Gerstein, University of California at Santa Barbara (cancelled)
Jon Grantham, IDA/CCS (cancelled)
Joshua Holden, Rose-Hulman Institute of Technology
Michael Jacobson, University of Manitoba, Canada
Jee Koh, Indiana University (cancelled)
Kristin Lauter, Microsoft Corporation (cancelled)

96. Oreilly.com -- Online Catalog: Java Cryptography
Java cryptography teaches you how to write secure programs using Java scryptographic tools. It Email This Page. Java cryptography. By
http://www.oreilly.com/catalog/javacrypt/

O'Reilly Home
Press Room Jobs Resource Centers Perl Java Python C/C++ ... Enterprise Development Book Series Hacks Head First Cookbooks In a Nutshell ... Developer's Notebooks Publishing Partners No Starch Press Paraglyph Press Pragmatic Bookshelf Syngress Publishing Online Publications LinuxDevCenter.com MacDevCenter.com WindowsDevCenter.com ONDotnet.com ... Scripts
Special Interest Events Meerkat News Ask Tim tim.oreilly.com ... Open Books Special Sales Academic Corporate Government Inside O'Reilly About O'Reilly International Advertise with Us Contact Us ... Bookstores Traveling to
a tech show? Hotel Search
Hotel Discounts

Discount Hotels

Chicago Hotels
...
Register your book
to get email notification of new editions, special offers, and more. Search on Safari Search contents of Java Cryptography Code Fragments only Also see:
Table of Contents

Index
Java Cryptography
By  Jonathan Knudsen
May 1998 ISBN: 1-56592-402-9 Buy from O'Reilly: Buy Online at: select a store O'Reilly Amazon.com Amazon.co.uk Amazon.ca Bookpool Borders Chapters.indigo.ca Digital Guru Foyles PC Bookshop (UK) Powell's Quantum Readme.doc

97. A Short History Of Cryptography
A brief historical analysis of the management of cryptography.
http://www.all.net/books/ip/Chap2-1.html
2.1 - A Short History of Cryptography
Cryptography is one of the oldest fields of technical study we can find records of, going back at least 4,000 years. It is quite noteworthy that of all the cryptosystems developed in those 4,000 years of effort, only 3 systems in widespread serious use remain hard enough to break to be of real value. One of them takes too much space for most practical uses, another is too slow for most practical uses, and the third is widely believed to contain serious weaknesses. We begin with a classification scheme for ciphers given by Gary Knight in the first of a series of articles which posed ciphers to the reader, and after a given period of time demonstrated reader solutions along with explanations of how they solved the ciphers. Versions of the solutions attained by the author were also given along with many mathematical techniques for "attacking the unknown cipher". Substitution Polyalphabetic Periodic Non-Interrelated Alphabets Interrelated Alphabets Pseudorandom Key Non-periodic Non-Random Key, Random Key Polygraphic Digraphic, Algebraic Monoalphabetic Standard, Mixed Alphabet, Homomorphic, Incomplete Mixed Alphabet, Multiplex, Double Fractionating Bifid, Trifid, Fractionated Morse, Morbit Transposition Geometrical - Rail-fence, Route, Grille Columnar Complete - Cadenus, Nihilist Incomplete - Myskowski, Amsco Double - U.S. Army Transposition Cipher A Classification Scheme for Ciphers

98. International Cryptography Freedom
INTERNATIONAL cryptography FREEDOM. Last Updated 27 July 2003 Add UnitedStates 22. UNITED STATES UNRESTRICTED cryptography. Program, URL, Notes.
http://jya.com/crypto-free.htm
INTERNATIONAL CRYPTOGRAPHY FREEDOM Last Updated 27 July 2003: Add United States 22
jya@pipeline.com
cryptome.org jya@pipeline.com Please mirror this page, or scavenge it to make your own. Let us know about additional sites or your page and we'll make a link. See also: Cryptome for news
Ritter's
Learning About Cryptography
Ritter's
Crypto Glossary and Dictionary of Technical Cryptography
UNITED STATES UNRESTRICTED CRYPTOGRAPHY Program URL Notes USUC 1
Cracking DES http://www.shmoo.com/~pablos/Cracking_DES/ The Shmoo Group is proud to present...
for the first time...
available legally for download in the United States...
from the jurisdiction of the 9th US Circuit Court of Appeals... USUC 2 Secure Office http://www.filesafety.com Mirror: http://come.to/SecureOffice Charles Booher's site, formerly under attack by the USG USUC 3
Secure Remote Password (SRP) distribution http://srp.stanford.edu/srp/ A cryptographically secure remote-access suite, featuring Telnet and FTP with full strength 128-bit encryption. Open Source, unrestricted downloads. Available from mirror sites worldwide. USUC 4
PGP 2.62

99. Quantum Informatics At The University Of Aarhus
Performs research on quantum computing with an emphasis on quantum cryptography.
http://www.cki.au.dk/

100. How To Make A Mint: The Cryptography Of Anonymous Electronic Cash
7200. HOW TO MAKE A MINT THE cryptography OF ANONYMOUS ELECTRONIC CASH. signature.Digital signatures are based on public key cryptography.
http://jya.com/nsamint.htm
http://www.ffhsj.com/bancmail/21starch/961017.htm Received October 31, 1996 With the Compliments of Thomas P. Vartanian
1001 Pennsylvania Avenue, N.W.
Washington, D.C. 20004-2505
Telephone: (202) 639-7200
HOW TO MAKE A MINT: THE CRYPTOGRAPHY OF ANONYMOUS ELECTRONIC CASH
Laurie Law, Susan Sabett, Jerry Solinas National Security Agency Office of Information Security Research and Technology Cryptology Division 18 June 1996 CONTENTS INTRODUCTION 1. WHAT IS ELECTRONIC CASH? 1.1 Electronic Payment 1.2 Security of Electronic Payments 1.3 Electronic Cash 1.4 Multiple Spending 2. A CRYPTOGRAPHIC DESCRIPTION 2.1 Public-Key Cryptographic Tools 2.2 A Simplified Electronic Cash Protocol 2.3 Untraceable Electronic Payments 2.4 A Basic Electronic Cash Protocol 3. PROPOSED OFF-LINE IMPLEMENTATIONS 3.1 Including Identifying Information 3.2 Authentication and Signature Techniques 3.3 Summary of Proposed Implementations 4. OPTIONAL FEATURES OF OFF-LINE CASH 4. 1 Transferability 4.2 Divisibility

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Page 5     81-100 of 176    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20

free hit counter