Geometry.Net - the online learning center
Home  - Science - Cryptography
e99.com Bookstore
  
Images 
Newsgroups
Page 8     141-160 of 176    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Cryptography:     more books (100)
  1. Practical Cryptography for Data Internetworks
  2. Information theory, coding and cryptography by Ranjan Bose, 2003

141. How PGP Works
The Basics of cryptography. When Julius Caesar sent messages to hisgenerals, he didn t trust his messengers. What is cryptography?
http://www.pgpi.org/doc/pgpintro/
How PGP works
The following text is taken from chapter 1 of the document Introduction to Cryptography http://access.adobe.com/ and then manually edited by hand.
  • The Basics of Cryptography
    • Encryption and decryption
    • What is cryptography?
      The Basics of Cryptography
      When Julius Caesar sent messages to his generals, he didn't trust his messengers. So he replaced every A in his messages with a D, every B with an E, and so on through the alphabet. Only someone who knew the "shift by 3" rule could decipher his messages. And so we begin.
      Encryption and decryption
      Data that can be read and understood without any special measures is called plaintext or cleartext. The method of disguising plaintext in such a way as to hide its substance is called encryption. Encrypting plaintext results in unreadable gibberish called ciphertext. You use encryption to ensure that information is hidden from anyone for whom it is not intended, even those who can see the encrypted data. The process of reverting ciphertext to its original plaintext is called decryption Figure 1-1 illustrates this process.

142. Bouncycastle.org
Provides open source implentations of the Java cryptography Extension 1.2.1, and a lightweight Java cryptography API for the J2ME, and the JDK. Open Source
http://www.bouncycastle.org/
home mailing lists latest releases documentation ... legal and licencing Welcome to the home of the Legion of the Bouncy Castle . A fun place to stay, if you've got some time to kill. Here at the Bouncy Castle, we believe in encryption. That's something that's near and dear to our hearts. We believe so strongly in encryption, that we've gone to the effort to provide some for everybody. The Bouncy Castle Crypto APIs consist of the following:
  • A lightweight cryptography API in Java.
  • A provider for the JCE and JCA.
  • A clean room implementation of the JCE 1.2.1.
  • A library for reading and writing encoded ASN.1 objects.
  • Generators for Version 1 and Version 3 X.509 certificates and PKCS12 files.
  • Generators/Processors for S/MIME and CMS (PKCS7).
  • Generators/Processors for OCSP (RFC 2560).
  • Generators/Processors for OpenPGP (RFC 2440).
  • A signed jar version suitable for JDK 1.4 and the Sun JCE.
The lightweight API works with everything from the J2ME to the JDK 1.4 Software produced by this site is covered by the following license. Looking for something not listed? Have a look at the projects listed on our resources page.

143. CyberLaw (tm) -- CRYPTOGRAPHY & SPEECH
cryptography SPEECH. Dr. Daniel Bernstein has some ideas about cryptography,the art and science of keeping messages secure, that he wants to share.
http://www.cyberlaw.com/cylw1095.html
by Jonathan Rosenoer
I. Restricting Access
"Without cryptography, what people send via computers is the electronic equivalent of a postcards, open to view by many people while the message is in transit. With cryptography, people can put both messages and money into electronic 'envelopes,' secure in the knowledge that what they send is not accessible to anyone except the intended recipient. ... Continued development of cryptography promises to make it possible for the worldwide computer Internet to offer private, secure and protected communication among billions of people worldwide."
II. Ideas as Munitions
While a Ph.D. candidate in Mathematics at the University of California at Berkeley, Daniel Bernstein worked in the field of cryptography and developed an "encryption algorithm or recipe which he calls 'Snuffle.'" He described Snuffle in English and in mathematical equations, as well as in the "C" computer programming language (Snuffle.c and Unsnuffle.c). Bernstein wants to publish his cryptographic ideas and research results "as part of the normal process of academic, scientific and political exchange of ideas and information," and, in particular, in "text journals as well as in an online discussion group about the science of cryptography, called sci.crypt. According to Bernstein, "[a]ware of the [Government's] civil and criminal restrictions on cryptography export, [he] asked the Office of Defense Trade Controls ("OTDC"), an arm of the State Department, to find out whether he could publish his ideas." He told OTDC that he wanted to export the document "The Snuffle Encryption System," and the Snuffle.c and Unsnuffle.c source files.

144. Kaladix Linux - The Secure Linux Distribution
Server distribution, includes set of security hardening patches, mostly for the kernel; RSBAC, cryptography, general security software. Currently unavailable.
http://www.kaladix.org/
News Information Get Kaladix Errata Documentation Links - Kaladix Linux - Secure and versatile Linux Distribution -
Welcome to kaladix.org, the official site of Kaladix Linux! Unfortunately the project has been discontinued. There will be no future release of Kaladix Linux anytime soon. Meanwhile private development on a Firewall specific appliance based on Linux is done, but exclusively sold to the [Login Lanstation Group] News Information Get Kaladix Errata Documentation About us Links
Jörg Lübbert

Linux is a registered trademark of Linus Torvalds.

145. Cryptography And Steganography
cryptography and Steganography. Codegroup. Utility which encodes and allthis. JavaScrypt BrowserBased cryptography. A collection
http://www.fourmilab.ch/nav/topics/crypto.html
Cryptography and Steganography
Codegroup
Utility which encodes and decodes binary files into five-letter code groups just like secret agents use. Handy for sending small binary messages by telephone, radio, or telegraph.
HotBits
Quantum mechanics teaches us that, at the deepest level, uncertainty rules the universe: there are things we cannot predict, even in principle. HotBits harnesses this fundamental uncertainty of nature to generate truly random bits, unlike the pseudorandom sequences created by an algorithm on a computer. Along the way, you'll find a discussion of the hardware and software used to generate the random bytes comprehensive enough to build your own, and peek under the hood of quantum mechanics to see why the data are genuinely random, and some of the implications of all this.
JavaScrypt : Browser-Based Cryptography
A collection of Web pages and programs in the JavaScript language perform military-grade encryption (256 bit secret key AES entirely within your Web browser you needn't download nor install any software, and nothing is sent to any Web site when you encrypt or decrypt a message. You can download the page source and JavaScript programs to your own computer and use them even when not connected to the Internet. Companion pages provide a text-based steganography facility and key generator suitable for preparing one-time key lists. Please visit the JavaScrypt Home Page for details, or the

146. Quantum Cryptography: Privacy Through Uncertainty
Explanation of quantum cryptography, with links and key citations.
http://www.csa.com/hottopics/crypt/overview.html
This page uses frames, but your browser doesn't support them.

147. The Metaphor Is The Key: Cryptography, The Clipper Chip, And The Constitution ©

http://www.law.miami.edu/~froomkin/articles/clipper.htm
This document is intended to be viewed with a frame capable Web browser. If you can read this your browser doesn't support frame viewing. Clicking here will take you to the noframes version.

148. Security Related Links
You are interested in Security and cryptography. cryptography. Intro SpecificTopics Politics Software Hardware Introductions to cryptography.
http://www.semper.org/sirene/outsideworld/security.html
You are interested in:
Security and Cryptography
Remark: Other security related references are on the "Organizations" "Privacy" "Standards" and "Conferences" pages.
Contents
Standards and Protocols
HTTP SHEN SHTTP MOSS ... IETF Working Groups

149. Bondi
Richard Bondi. Subtitled A Programmer's Guide to the Microsoft CryptoAPI which describes what the book is about.
http://www.cryptovb.com/books/bondi/bondi.html
Cryptography for Visual Basic: A Programmer’s Guide to the Microsoft CryptoAPI
"This is essential reading for anyone who needs to understand Microsoft’s CryptoAPI, its strengths and its limitations."
—Bruce Schneier, author of Applied Cryptography and CTO of Counterpane Internet Security, Inc See author’s description below. Publisher Author Richard Bondi Pub. Date September 2000 ISBN Format Purchase
Author’s Description
I wrote this book in order to make strong cryptography available to as many Visual Basic programmers as possible. The best way to do that was to write some very intuitive VB COM wrappers, and release them to the world with an Open Source license. That kind of license both permits and encourages programmers to make the source code available to other programmers, and to modify it for their own use, free of charge. (You can read more about Open Source licenses here Unfortunately, cryptography is complicated. That means that there can be no such thing as simple COM cryptography objects per se. In order to program with cryptography, a programmer must first have a good grasp of the basics of modern cryptography. Therefore my approach was to write a book that does that, and then write my COM objects so that they would be intuitive and simple for someone who understands cryptography. So my book has three main goals:
  • Explain modern cryptography to Visual Basic programmers (Chapter 1).
  • 150. Honors Seminar In Cryptography
    Honors Seminar in cryptography. Spring Semester, 2002. University of Illinoisat Chicago. Seminar Outline. Part I. cryptography before 1960.
    http://raphael.math.uic.edu/~jeremy/crypt/crypt.html

    Honors Seminar in Cryptography
    Spring Semester, 2002
    University of Illinois at Chicago
    Intro Outline Requirements Projects
    Introduction
    The Honors Seminar in Cryptography is a one-hour-a-week course for members of the Honors College at UIC on the basics of Cryptography, the science of secret communication. Once pursued unscientifically by diplomats, spies, and puzzlers, Cryptography has developed into a highly mathematical science. In this seminar, we will discuss the basic elements of this science. In addition, we will review how the Allied efforts to break German and Japanese codes contributed both to better cryptographic techniques and to other developments in computers and mathematics. We will learn about modern techniques of public key cryptography, and and we will discuss the many important implications that Cryptographic science and policy has for civil liberties, commerce, and law enforcement. While not a technical course in mathematical cryptography, participants in the seminar will need to be willing to learn some basic probability and number theory, and to use computers for some projects. They will also be expected to actively participate in the discussions. This Web Page is still under development! Send comments to

    151. Crypto-Log: Internet Guide To Cryptography
    CryptoLog, the Internet Guide to cryptography, is an annotated collection ofpointers to everything available on the net/web about cryptography (programs
    http://www.uni-mannheim.de/studorg/gahg/PGP/cryptolog1.html
    "LAWFUL USE OF ENCRYPTION.-It shall be lawful for any person within any State of the United States... to use any encryption, regardless of encryption algorithm selected, encryption key length chosen, or implementation technique or medium used...
    except as provided in this Act... or in any other law. Senate Bill S.1587 - The Encrypted Communications Privacy Act
    introduced 5 March 1996 by Sen. Leahy (D-VT) and Rep. Goodlatte (R-VA)
    Electronic Privacy Information Center

    and Voters Telecommunications Watch
    The Main Page:
    C RYPTO• L OG TM
    The Internet Guide to Cryptography
    Updated Friday 29 March 1996
    WELCOME PAGE
    FEEDBACK
    Table of Contents:

    152. Alt.security.keydist Resources
    Instructions for distributing public keys on Usenet. Also features information and links of interest to those interested in cryptography rights.
    http://www.alt-security-keydist.info/
    alt.security.keydist Resources
    This site is a collection of resources about and relating to alt.security.keydist , a newsgroup used to distribute public encryption keys (such as those used by PGP and GPG ) through the UUCP NNTP netnews system.
    alt.security.keydist FAQs
    The FAQ was created in 1997. After a few years of inactivity, it's now being posted to the group every 30 days. The FAQ was last updated 1 January 2004. The alt.security.keydist FAQ is a "news.answers-approved" FAQ , and therefore archived at most major FAQ archives on the Internet, including the rtfm.mit.edu FTP server and FAQS.org
    alt.security.keydist Software Recommendations
    Since alt.security.keydist is intended for people who use both Usenet and public key encryption, I've decided to add a quick list of software that helps people use public key encryption on Usenet.
    Cryptography Newsgroups
    A list of other cryptography-related newsgroups is also available.

    153. COmputer Security And Industrial Cryptography
    COSIC COmputer Security and Industrial cryptography COSIC coorganizes aseries of seminars on Computational Number Theory and cryptography.
    http://www.esat.kuleuven.ac.be/cosic/
    COSIC: Home
    All SISTA COSIC DocArch For information on a specific research
    group select one of the links above
    Home
    About People Research ... Contact Info
    COSIC CO mputer S ecurity and I ndustrial C ryptography
    Press release: August 12, 2003 - Vulnerability in Secure Login Token Discovered ( Dutch English
    Press release: February 27, 2003 - NESSIE project announces final selection of crypto algorithms ( English

    General info about COSIC's current and past activities COSIC is headed by Prof. Bart Preneel and Prof. Joos Vandewalle. More about the people at COSIC. COSIC's current research and projects COSIC's publications from 1982 until 2003. COSIC's (Master) thesis proposals and a list of the past Master theses COSIC organizes biweekly seminars on various topics.
    COSIC organizes bi-annually an International Course on the State of the Art and Evolution of Computer Security and Industrial Cryptography . The last two editions were held June 3-6, 2003 , and June 5-8, 2001
    Alex Biryukov, full time postdoc researcher at COSIC, teaches a special course on ``Methods of Cryptanalysis'' . These courses are scheduled every Friday starting from October 18th.
    COSIC co-organizes a series of seminars on Computational Number Theory and Cryptography Leuven Security Excellence Consortium
    L-SEC has been formed in February 2002 by 8 founding members: Banksys, Cryptomathic, DATA4s, HyperTrust, K.U.Leuven, Telindus, Ubizen and Utimaco Safeware. The sponsoring member is PricewaterhouseCoopers.

    154. Cryptography Software Code In Visual Basic And C
    A commercial site for Visual Basic developers interested in implementing cryptography by using CryptoSys.
    http://www.di-mgt.com.au/crypto.html
    DI Management Services is a database design and business systems consultant based in Sydney, Australia ...more...
    Cryptography Code
    About the cryptography code page
    This page contains useful free cryptographic software code that David Ireland has written or adapted in Visual Basic and ANSI C. There are also some links to useful cryptography sites . This work is updated frequently, so keep checking. Table of contents below. Our brand new CryptoSys PKI Toolkit for Visual Basic and C/C++ developers has been released on 25 February 2004. The PKI Toolkit features RSA public key encryption, digital signatures, X.509 certificate handling, and cryptographic message syntax (CMS) objects that can be used with S/MIME. The toolkit includes other utilities like message digest computation, secure random numbers, and base64 conversion functions. More details at CryptoSys PKI Toolkit The PKI Toolkit is the perfect companion for our original CryptoSys API product which includes symmetrical encryption functions (AES, Triple DES, Blowfish, DES) and advanced hash functions (SHA-1, SHA-256). More details at
    Not quite cryptography, but please check out our new

    155. MyCrypto.net - Encryption, Privacy And Internet Security
    Provides information on how cryptography can be used in protecting privacy on the Internet.
    http://www.mycrypto.net/

    Surf the Web Anonymously
    Encryption and Privacy
    "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." Benjamin Franklin, 1759.
    Security and privacy have long been important issues forming the basis of numerous democracies around the world. In the digital age, securing personal information and ensuring privacy pose to be issues of paramount concern. At first glance, one might find it gratifying that an online website greets the person by their first name, sends them emails when goods of their taste are added, or recommends goods services based on their demographic profile, previous visits, etc. An astute surfer though will also see the privacy drawbacks in such services. Who else is being provided this information? Is there a way to ensure the security of this information? What happens with the information if the company meets financial diffuculties and has to liquidate its assets? Where does all that "private information" go?
    Many studies over the last few years have suggested that a majority of consumers are concerned about when, what and how their personal information is being collected, how this information is being used and whether it is being protected. They want to know whether the information is being sold or shared with others, and if so with whom and for what purposes. They also want to have control over their privacy in today's digital age where strides in telecommunicaiton, storage and software technologies have made monitoring a person's activities effortless.

    156. Cryptography's Role In Securing The Information Society
    cryptography s. Role. In. Securing The. Information. Society. 1 GROWING VULNERABILITYIN THE INFORMATION AGE; 2 cryptography ROLES, MARKET, AND INFRASTRUCTURE;
    http://www.nap.edu/readingroom/books/crisis/
    C ryptography's
    R ole
    I n
    S ecuring The
    I nformation
    S ociety
    Computer Science and Telecommunications Board National Research Council ASCII VERSION Contents of the Report

    157. Bibliography Of "Designs, Codes And Cryptography"
    Hypertext bibliography containing all papers published in Designs, Codes and cryptography, maintained by David M Jones.
    http://liinwww.ira.uka.de/bibliography/Misc/HBP/DCC.html
    The Collection of
    Computer Science Bibliographies Up: Bibliographies of the Hypertext Bibliography Project Collection Home
    Bibliography of "Designs, Codes and Cryptography"
    About Browse Statistics Number of references: Last update: July 6, 2001 Number of online publications: Supported: no Most recent reference: May 1998 Search the Bibliography Query: Options case insensitive Case Sensitive partial word(s) exact online papers only Results Citation BibTeX Count Only Maximum of matches Help on: [ Syntax Options Improving your query Query examples
    Boolean operators: and and or . Use to group boolean subexpressions.
    Example: (specification or verification) and asynchronous Information on the Bibliography
    Editor:
    David M. Jones (email mangled to prevent spamming)
    Theory of Computation Group

    MIT Laboratory for Computer Science
    Room NE43-316
    545 Technology Square
    Cambridge, MA 02139
    USA
    Hypertext Bibliography Project
    Browsing the bibliography
    • Original source:
      Used to be available at
      http://theory.lcs.mit.edu/~dmjones/hbp/dcc/dcc.bib but has disappeared.

    158. Oxford Quantum Computation Group
    We have moved! The Oxford Quantum Computation and cryptography Group isnow part of the Centre for Quantum Computation. Our new address is
    http://eve.physics.ox.ac.uk/QChome.html
    We have moved! The Oxford Quantum Computation and Cryptography Group is now part of the Centre for Quantum Computation. Our new address is: http://www.qubit.org

    159. Internet Law & Policy Forum: Bringing Law, Policy, Business And Technology Toget
    A collection of links to digital signature related laws, policy development, ecommerce, and cryptography resources. (Internet Law and Policy Forum)
    http://www.ilpf.org/groups/index.htm#authentication
    @import "../ui_sophisticated.css"; Home About ILPF Who is the ILPF Join ILPF ...
    Spam
    Working Groups
    Please find below a listing of the ILPF Working Groups and Publications.
    Content Liability Electronic Authentication

    160. Financial Cryptography '00
    The conference is organized by the International Financial cryptographyAssociation (IFCA). The Financial cryptography conferences
    http://fc00.ai/
    Fourth International Conference
    21-24 February 2000, Anguilla, BWI
    FC00, the fourth international conference on financial data security and digital commerce, will be held 21-24 Febuary 2000 in Anguilla , British West Indies. FC00 aims to bring together persons involved in both the financial and data security fields to foster cooperation and exchange of ideas. The conference is organized by the International Financial Cryptography Association IFCA The Financial Cryptography conferences are intended for anybody interested in secure digital commerce and related technologies. In addition to the core technical presentations, there are discussions of policy, regulatory, legal, and banking issues. The conference has international participation from the business, legal, and scientific communities, and is a valuable forum in which to make new contacts and disseminate information. Special pricing is available for academic and student attendees. The conference will be held at Chandeliers , the conference facility of the InterIsland Hotel, which is on Road Bay, near Sandy Ground Village, in the South Hill section of Anguilla. To receive announcements about the Financial Cryptography conference series in general, send email to fc-request@ifca.ai with the subject "subscribe". To receive information about the FC00 conference in particular, send email to fc00-request@ifca.ai with the subject "subscribe".

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 8     141-160 of 176    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20

    free hit counter