Geometry.Net - the online learning center
Home  - Science - Cryptography
e99.com Bookstore
  
Images 
Newsgroups
Page 5     81-98 of 98    Back | 1  | 2  | 3  | 4  | 5 
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Cryptography:     more books (100)
  1. Cryptography in the Database: The Last Line of Defense by Kevin Kenan, 2005-10-29
  2. Cryptography and E-Commerce: A Wiley Tech Brief by Jon C. Graff, 2000-12-11
  3. Implementing SSL/TLS Using Cryptography and PKI by Joshua Davies, 2011-02-08
  4. Handbook of Financial Cryptography and Security (Chapman & Hall/CRC Cryptography and Network Security Series)
  5. Access Control, Security, and Trust: A Logical Approach (Chapman & Hall/CRC Cryptography and Network Security Series) by Shiu-Kai Chin, Susan Beth Older, 2010-07-26
  6. Codes: An Introduction to Information Communication and Cryptography (Springer Undergraduate Mathematics Series) by Norman L. Biggs, 2008-08-08
  7. Theoretical Computer Science: Introduction to Automata, Computability, Complexity, Algorithmics, Randomization, Communication, and Cryptography (Texts in Theoretical Computer Science. An EATCS Series) by Juraj Hromkovic, 2010-11-02
  8. Cryptography: An Introduction by Nigel Smart, 2004-12-30
  9. Algorithmic Number Theory: Lattices, Number Fields, Curves and Cryptography (Mathematical Sciences Research Institute Publications)
  10. Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series) (v. 2)
  11. Practical Signcryption (Information Security and Cryptography)
  12. Public Key Cryptography - PKC 2005: 8th International Workshop on Theory and Practice in Public Key Cryptography (Lecture Notes in Computer Science / Security and Cryptology)
  13. Algebraic Aspects of Cryptography (Algorithms and Computation in Mathematics) by Neal Koblitz, 2010-11-30
  14. Cryptography: An Introduction to Computer Security (Advances in Computer Science Series) by Jennifer Seberry, Josef Pieprzyk, 1989-09

81. History Of Computer Cryptography And Secrecy Systems
A historical overview of early cryptographic techniques.
http://www.dsm.fordham.edu/~mathai/crypto.html
History of Computer Cryptography and Secrecy Systems
Jacob Mathai
Steganography
A secrecy technique where the existence of an actual message is hidden. The word is derived from the Greek words steganos (covered) and graphein (to write). Steganography is ancient technique that has been used for thousands of years as a primitive for secrecy systems and secret communications. In the first century, Pliny the Elder described how the milk from a thitymallus plant could be used as invisible ink. Another technique in ancient Greece and Persia involved shaving a messenger's head, writing a message on his scalp and waiting for the hair to grow back before sending the messenger to the destination. The technique primarily achieves security through obscurity and it's basic weakness is that if the message is discovered, the secret communication is revealed.
Cryptography
Cryptography is a technique used to hide the meaning of a message and is derived from the Greek word kryptos (hidden). This is different from steganograhic techniques in that one is not hiding the actual message, only the meaning of the message. If a message were to fall into the hands of the wrong person, cryptography should ensure that that message could not be read. Typically the sender and receiver agree upon a message scrambling protocol beforehand and agree upon methods for encrypting and decrypting messages. Cryptography is further divided into two implementation techniques and those include transposition and substitiution.

82. Python Cryptography Toolkit
A collection of cryptographic algorithms and protocols, implemented for use from Python.
http://www.amk.ca/python/code/crypto
Home Python Code
Python Cryptography Toolkit
Search amk.ca
This page last modified: 26 Sep 2008 Cryptography toolkit GPG module jwzthreading Medusa ... Photo Gallery I no longer maintain this package; the new maintainer is Dwayne C. Litzenberger. Go to www.pycrypto.org to learn about current development. Bugs and patches can be submitted using the pycrypto project on Launchpad This is a collection of cryptographic algorithms and protocols, implemented for use from Python. The last release by me was 2.0.1, which can still be downloaded below.
Note on Exporting Crypto Code
With the relaxing of US export controls for encryption software, it's now possible to distribute cryptographic source code and export it from the US, so now anyone in the world can download the Python Cryptography Toolkit. (Note that export controls still apply to binary software, though; if you're an American citizen, please consult the informative links at the CDT's Encryption Issues Page , and write a brief letter to your legislators expressing your annoyance.)
Download the code
pycrypto-2.0.1.tar.gz

83. Matt Blaze / Crypto.com
Information and news about cryptography related legislation in the United States. Very pro-crypto.
http://www.crypto.com/
mab's stuff:
  • blog
  • research papers
  • bio
  • Trust Management ...
  • CIS-380 (Fall '08)
    Other links:
  • Halfbakery
  • Questionable Utility
  • Ron Rivest
  • Crypto Bibliography ...
  • EPIC
    Welcome to crypto.com, Matt Blaze's cryptography resource
    Penn: I'm teaching Operating Systems this semester (Fall '08). The course web page is here New (January, 2007 and later): I've finally joined the late 20th century and installed a blog, "Matt Blaze's Exhaustive Search" [http://www.crypto.com/blog]. Most of what I write and do from now on will be announced on the blog, so check there to see what's new. Older stuff: August 6, 2006: Our USENIX Security paper on "Keyboards and Covert Channels" (for which Gaurav Shah and Andres Molina won Best Student Paper) is now available in the papers directory (PDF format). The paper introduces "JitterBugs", a new class of hardware keyboard sniffer that does not require subsequent access or any changes to the host software. JitterBugs demonstrate that "supply chain attacks" can be a practical and powerful threat.
    Fall, 2006:
  • 84. Cryptography And Security: Encryption, Steganography, Secure File Deletion
    Explanation of encryption, ECHELON, multiple file encryption software, and why you need encryption.
    http://www.hermetic.ch/crypto.htm
    German version Cryptography and Security Who needs encryption? Anyone who values privacy. The #59 issue of CovertAction Quarterly has an article by New Zealand writer Nicky Hagar about the Global Surveillance Network, which is the means whereby the governments of the U.S.A. and the U.K., and to a lesser extent those of Canada, Australia and New Zealand (the five countries in the UKUSA espionage 'alliance') attempt to eavesdrop on every international telex, fax and email message. This is the ECHELON system , run by the U.S. National Security Agency (NSA). In July 1997 plans were announced to double the capacity of the New Zealand spy station and to tap phone calls as well as non-voice communications (see Spy Power Boost for Secret Station ). The way to foil the NSA eavesdroppers is to encrypt all communications. Their computers are the fastest that U.S. taxpayers' money can buy, but if many more people use encryption the NSA's computers will be overwhelmed by the sheer volume of encrypted traffic.
    These reports suggest that if you use an application program which uses Microsoft's CryptoAPI to encrypt data which you store on your PC then the NSA has a backdoor to that data, that is, the NSA can read what you think you have safely hidden away from their prying eyes.

    85. MCSoft Security Solutions - Cryptography Software - Encryption, Wiping And Digit
    Offers cryptography and wipe software.
    http://www.mcsoft.eu
    MCSoft Security Solutions Home Software ActiveX Projects Contact ... Cryptography Software The major objective of MCSoft is to implement cryptography products which guarantee a high security level. Our products allow a high degree of data protection (Data integrity, data authenticity and confidentiality of digital information) through the used algorithms and standards. Now following we give a short overview about the algorithms, standards and technologies which are available to our customers: cryptographic algorithms such as Rijndael AES Serpent or Twofish
    Signature
    Functions
    Message Authentication Codes
    (MAC)
    Manipulation Detection Codes
    (MDC) and Hash Functions
    Wipe
    Standards such as DoD 5220.22-M or Peter Gutmann
    CSPRNG

    A wide spectrum of encryption algorithms, Manipulation Detection Codes, Message Authentication Codes and algorithms for the secure deletion (Wipe) can be applied in a simple way on files and folders. Through compression algorithms (for example ZIP and other) files and folders can be compressed optionally before they are encrypted. As well as software for the secure transmission of EMail messages is in our product catalog available. Cryptography ActiveX Components Beside the software products MCSoft implements specific, highly secure ActiveX components. The above mentioned algorithms, standards and technologies were implemented for developers of software in ActiveX components. Through that it is possible to integrate highly secure functions into some own developments in a simple way. The ActiveX components contain the entire functionality of the software products.

    86. The Hardware Side Of Cryptography
    Blog outlining techniques to implement cryptographic and hash functions in PIC microcontrollers.
    http://edipermadi.wordpress.com
    @import url( http://s0.wp.com/wp-content/themes/pub/silver-black/style.css?m=1274400606g );
    The Hardware Side of Cryptography
    1 June 2010
    Oldskool Memory Skrambler
    Filed under: Uncategorized Block Cipher Memory Memory Protection ... SRAM Memory scrambling is the process of messing up the contents of memory, either by remapping the adress, data encipherment or even both of them. The aim is to complicate data retrieval from memory, this is also useful to protect a small and sensitive stuff such as firmware. The address remapping itself is nothing new, its actually a bijective mapping of plain address to scrambled address. In real life this keyed scrambling is made through the usage of block cipher. The mode could be enciphering or deciphering, since address scrambling is a one way mapping. The content encipherment is working in the same way as address scrambling. It is also based on block cipher. However, content encipherment is sensitive to address and direction since the process must be able to recover the data stored at memory. The writing processis encipherment while the reading process is decipherment. The 64 kbytes of SRAM takes 16-bits of address 8-bits of data with two additional control RD and WR. Here, as a prototype, we can use S-AES (a 16-bits block cipher with 16-bits of key) to scramble the address either in enciphering and deciphering mode. The 8-bits of content will be scrambled using S-DES (a 8-bits block cipher with 10-bits of key).

    87. Shucheng Yu's Home Page
    Assistant professor at UALR. Publications, contact information, and research in network security and applied cryptography.
    http://www.ualr.edu/sxyu1

    88. [quant-ph/0101098] Quantum Cryptography
    Preprint with the overview of quantum cryptography.
    http://arxiv.org/abs/quant-ph/0101098
    arXiv.org quant-ph
    Search or Article-id Help Advanced search All papers Titles Authors Abstracts Full text Help pages
    Full-text links:
    Download:
    Current browse context:
    quant-ph
    new
    recent

    89. Visual Basic Instinct : Cryptography
    Explains cryptography from the Visual Basic point of view. Includes custom controls and DLLs for download.
    http://www.vbi.org/Folders/index.asp?id=572

    90. Cryptography Software Code In Visual Basic And C
    A commercial site for Visual Basic developers interested in implementing cryptography by using CryptoSys.
    http://www.di-mgt.com.au/crypto.html
    Sitemap DI Management Home
    Cryptography Code
    This page contains useful free cryptographic software code that David Ireland has written or adapted in Visual Basic and ANSI C, and various articles on cryptography. This page is updated frequently, so keep checking. ( This page last updated 20 October 2010.
    Add a comment to this page
    . Jump to Cryptography Links
    Contents
    Articles and Code Base64 encoding in Visual Basic BigDigits: Multiple-precision arithmetic algorithms source code in ANSI C Binary and byte operations in Visual Basic ... XML-Dsig
    Products
    We sell commercial cryptography software under the CryptoSys brand name. You can download fully-functional trial versions to try them out at no cost. CryptoSys API CryptoSys API is library of cryptography tools that includes the standard symmetrical encryption functions (AES, Triple DES, Blowfish, DES), hash functions (MD5, SHA-1/224/256/384/512), HMAC and CMAC authentication, and other cryptographic utilities. Version 4.4 was released 9 August 2010 with interfaces for VB6, VBA, C, C++

    91. Bouncycastle.org
    Provides open source implementations of the Java cryptography Extension 1.2.1, and a lightweight Java cryptography API for the J2ME, and the JDK. Open Source
    http://www.bouncycastle.org/
    The Legion of the Bouncy Castle
    english
    Welcome
    Welcome to the home of the Legion of the Bouncy Castle . A fun place to stay, if you've got some time to kill. Here at the Bouncy Castle, we believe in encryption. That's something that's near and dear to our hearts. We believe so strongly in encryption, that we've gone to the effort to provide some for everybody, and we've now been doing it for over 10 years! The Bouncy Castle Crypto APIs consist of the following:
    • A lightweight cryptography API for Java and C#. A provider for the Java Cryptography Extension and the Java Cryptography Architecture. A clean room implementation of the JCE 1.2.1. A library for reading and writing encoded ASN.1 objects. A light weight client-side TLS API. Generators for Version 1 and Version 3 X.509 certificates, Version 2 CRLs, and PKCS12 files. Generators for Version 2 X.509 attribute certificates. Generators/Processors for S/MIME and CMS (PKCS7/RFC 3852). Generators/Processors for OCSP (RFC 2560). Generators/Processors for TSP (RFC 3161).

    92. CECC 2009
    The next in the series of Central European Conferences on cryptography organized very year since 2000.
    http://conf.fme.vutbr.cz/cecc09/
    9th Central European Conference on Cryptography - Tøebíè'09
    June 23 -26, 2009
    Under the auspices of Ing. Ivo Uher, Major of city Tøebíè and doc. RNDr. Miroslav Doupovec, CSc., Dean of the Faculty of Mechanical Engineering, Brno University of Technology.
    The 9th Central European Conference on Cryptography - Tøebíè'09 is the next in the series of Central European Conferences on Cryptography, a series which has become a traditional meeting of people interested in all areas of cryptography. The CECC series is organized every year since the year 2000 in one of the Central European countries - Austria, Czech Republic, Hungary, Slovak Republic and Poland. The aim of the conference is to bring together researchers in all aspects of foundations of cryptography, and related areas, theoretical or applied (e.g. encryption schemes, signature schemes, general cryptographic protocols, design of cryptographic systems, key management, computational difficulty, one-way functions, zero-knowledge proofs, pseudorandomness, information assurance, security in information systems, coding theory etc).
    All participants are encouraged to present a contributed talk ( see abstracts of invite speakers ). The proceeding of the conference will be published in the Tatra Mountains Mathematical Publications (

    93. An Introduction To Cryptography
    Richard A. Mollin. Intended for a one-semester introductory undergraduate course in cryptography and covers symmetric and public key systems with chapters on advanced topics. Includes errata and brief overview.
    http://math.ucalgary.ca/~ramollin/cryptopref.html
    AN INTRODUCTION TO CRYPTOGRAPHY
    To see the cover, click on the red dot:
    ISBN#: 1-58488-127-5
    Reviews
    "This is a great book! It can be used in many ways: for a university course at one extreme, and as selective light reading for pleasure at the other. The author's enthusiasm carries the reader along clearly and easily, spilling over to scores of fascinating, beautifully written footnotes, which include more than fifty mini-biographies." "...this book is excellent and highly recommended." Short Book Reviews, Vol. 21, No. 2, August, 2001
    For those who have a copy, here is an online updates page
    TABLE OF CONTENTS:
    BRIEF OVERVIEW:
    Chapter Five on factoring is the first of two optional chapters. Section One involves an illustrated description of three factoring algorithms: Pollard's p-1 method, the Brillhart-Morrison continued fraction algorithm, and the quadratic sieve. A brief history of how the work of Legendre, Euler, Kraitchik and Lehmer led to the development of these algorithms is also provided, as is a discussion of how the notions can be generalized. This motivates the topic of Section Two, which begins with an illustration of how Pollard's original idea for factoring with cubic integers led to the development of the number field sieve. Then a detailed description of the special number field sieve is given (with the factorization of the ninth Fermat number as an illustration) along with a discussion of its complexity in relation to the general number field sieve.

    94. CryptoKids® America's Future Codemakers & Codebreakers
    National Security Agency Kids Page. Welcome to the NSA/CSS Kid's Page
    http://www.nsa.gov/kids/
    Welcome to the NSA/CSS Kid's Page
    Download Flash Player

    95. RSA: Hacking And Cracking
    Discusses security problems and possible attacks against the RSA cryptosystem.
    http://members.tripod.com/irish_ronan/rsa/
    Build your own FREE website at Tripod.com Share: Facebook Twitter Digg reddit document.write(lycos_ad['leaderboard']); document.write(lycos_ad['leaderboard2']);
    RSA: Hacking and Cracking
    For the most recent updates please use the Plan page . It contains a record of changes to the site. Also you can view the finished report (4/May/2001) Try out my AES applet My name is Ronan Killeen and I am doing an undergraduate course, Information and Communications at Trinity College, Dublin . My final year project is RSA: Hacking and Cracking. It will investigate the possibility of breaking the encryption, widely accepted as the strongest around today. The inventers of RSA, Ron Rivest, Adi Shamir, and Leonard Adleman predicted that it could not be broken within the lifetime of the universe. But in 1994 a challenge posed by Martin Gardner was solved by a collaboration of over 600 volunteers, proving that the estimates were a shade conservative. What if the system is not as secure as we previously thought? Please use the following links to navigate through the site.

    96. International Association For Cryptologic Research
    Non-profit scientific organisation intended to further research in cryptology.
    http://www.iacr.org/
    International Association
    for Cryptologic Research
    The International Association for Cryptologic Research (IACR) is a non-profit scientific organization whose purpose is to further research in cryptology and related fields.
    What's new?
    2010 elections for the IACR board are in progress
    IACR Conferences
    IACR Workshops

    97. Introduction
    Outline of the various types of cipher systems that have been used historically and the relationships between them.
    http://www.quadibloc.com/crypto/intro.htm
    Next Up/Previous/Index
    A Cryptographic Compendium
    This site contains a brief outline of the various types of cipher systems that have been used historically, and tries to relate them to each other while avoiding a lot of mathematics. Its chapters are:
  • Paper and Pencil Systems
  • Electrical and Mechanical Cipher Machines
  • Telecipher Machines
  • The Computer Era ...
  • Miscellaneous Topics You can also go directly to a complete table of contents It deals with methods of sending secret messages ranging from pencil and paper systems performed by hand to today's advanced block ciphers, such as Rijndael , the cipher chosen as the Advanced Encryption Standard, as depicted at right.
    Introduction
    This page is about codes and ciphers, which people use to communicate with each other in ways that other parties cannot (it is hoped) understand. Although secrecy in communication can precede literacy, for example by the use of obscure allusions, a spoken language that is different from the one commonly spoken, a jargon or cant of terms with special or secondary meanings, or a conventionalized way of speaking such as Pig Latin, the efflorescence of many and sophisticated methods of secret communications waited for the development of alphabetic writing, which allows any thought to be represented by a small number of easily manipulated characters.
    Even then, it took a conceptual breakthrough to realize that letters can be represented by other symbols; particularly in introductory books on the subject for children, this is often illustrated by various examples that are used today, such as Morse code
  • 98. Accueil
    Des tudiants pr sentent leur TPE sur les techniques de cryptographie et leurs applications.
    http://bobbyseb.free.fr/
    Objectif de ce site .
    Le but de notre travail, sans être exhaustif, est de préciser les fondements de la cryptographie et d'expliquer par quelques exemples simples son application quotidienne. Il a été créé et développé dans le cadre des Travaux Personnels Encadrés (TPE) de Terminale S par deux élèves du Lycée Saint-Michel de Picpus:
    • Sébastien LAGEIX Julien PERRAUDEAU
    Le thème choisi est "la cryptographie en informatique" Avant-Propos Connaissez-vous l’importance réelle possédée par la cryptographie dans notre société moderne ?
    En effet, qui n'a jamais entendu parler de vols de données à des fins déviées plus ou moins frauduleuses ou de transmissions de données tactiques d'un théâtre d'opérations vers un centre de décision opérationnelle à très haute confidentialité?
    C'est pourquoi dans le cadre du TPE, nous nous sommes plus particulièrement focalisés sur la cryptographie informatique.

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 5     81-98 of 98    Back | 1  | 2  | 3  | 4  | 5 

    free hit counter