To see the other types of publications on this topic, follow the link: Cryptographes.

Books on the topic 'Cryptographes'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Cryptographes.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Sokolov, Artem, and Oleg Zhdanov. Cryptographic constructions on the basis of functions of multivalued logic. INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1045434.

Full text
Abstract:
Symmetric encryption algorithms have been successfully used to protect information during transmission on an open channel. The classical approach to the synthesis of modern cryptographic algorithms and cryptographic primitives on which they are based, is the use of mathematical apparatus of Boolean functions. The authors demonstrate that the use to solve this problem of functions of multivalued logic (FML) allows to largely improve the durability of the cryptographic algorithms and to extend the used algebraic structures. On the other hand, the study of functions of multivalued logic in cryptography leads to a better understanding of the principles of cryptographic primitives and the emergence of new methods of describing cryptographic constructions. 
 In the monograph the results of theoretical and experimental studies of the properties of the FML, the presented algorithms for generating high-quality S-blocks for the symmetric encryption algorithms, as well as full-working samples of the cryptographic algorithms ready for practical implementation.
 For students and teachers and all those interested in issues of information security.
APA, Harvard, Vancouver, ISO, and other styles
2

United States. National Security Agency/Central Security Service. Center for Cryptologic History, ed. The Friedman legacy: A tribute to William and Elizebeth Friedman. 3rd ed. The Center, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

F, Friedman William. The Friedman legacy: A tribute to William and Elizebeth Friedman. The Center, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Churchhouse, R. F. Codes and ciphers: Julius Caesar, the Enigma, and the internet. Cambridge University Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

David, Kahn. The codebreakers: The story of secret writing. Scribner, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Stinson, Douglas R., and Maura B. Paterson. Cryptography. Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9781315282497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rubinstein-Salzedo, Simon. Cryptography. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94818-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Levy, Steven. Crypto: How the code rebels beat the government-saving privacy in the digital age. Viking, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Noonan, Diana. I spy. Wright Group, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

B, Rowlett Frank. The story of MAGIC: Memoirs of an American cryptologic pioneer. Aegean Park Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kapera, Zdzisław Jan. Marian Rejewski pogromca Enigmy. Enigma Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Koç, Çetin Kaya, ed. Cryptographic Engineering. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-71817-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Dong, Ling, and Kefei Chen. Cryptographic Protocol. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-24073-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Horváth, Máté, and Levente Buttyán. Cryptographic Obfuscation. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-98041-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

service), SpringerLink (Online, ed. Cryptographic Engineering. Springer US, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Martin, Keith M. Cryptographic Applications. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0012.

Full text
Abstract:
This chapter considers eight applications of cryptography. These essentially act as case studies relating to all the previous material. For each application, we identify the security requirements, the application constraints, the choice of cryptography used, and the ways that the keys are managed. We begin with the SSL/TLS protocols used to secure Internet communications. We then examine the cryptography used in W-Fi networks, showing that early cryptographic design mistakes have subsequently been corrected. We then examine the evolving cryptography used to secure mobile telecommunications. This is followed by a discussion of the cryptography that underpins the security of payment card transactions. We look at the cryptography of video broadcasting and identity cards. We then examine the cryptography behind the Tor project, which use cryptography to support anonymous communication on the Internet. Finally, we examine the clever cryptographic design of Bitcoin, showing how use of cryptography can facilitate digital currency.
APA, Harvard, Vancouver, ISO, and other styles
17

Martin, Keith M. Control of Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0014.

Full text
Abstract:
In this chapter, we will discuss the complex issue of controlling the use of cryptography. We will identify a societal dilemma that arises from the use of cryptography. We will present arguments for and against control of use of cryptography, as well as identifying a number of different strategies for doing so. We will then review various historical approaches that have been adopted for trying to control the use of cryptography, including backdoors, export controls, and key escrow. We then consider the control of cryptography in the modern era, illustrating that the ubiquity and complexity of technology using cryptography provides both challenges and opportunities for undermining cryptographic protection.
APA, Harvard, Vancouver, ISO, and other styles
18

Martin, Keith M. Cryptography for Personal Devices. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0013.

Full text
Abstract:
In this chapter, we consider some of the cryptography which can be used to protect data stored on personal devices. We begin by looking at various forms of cryptographic file protection, including full disk encryption. We then consider the cryptography which can be used to support two applications widely used on personal devices, namely, email and asynchronous messaging. To illustrate the latter, we discuss the cryptography deployed by the application WhatsApp. Finally, we obtain a slightly different perspective by providing an overview of the cryptography supported by one particular device platform, Apple’s iOS operating system.
APA, Harvard, Vancouver, ISO, and other styles
19

Advanced Military Cryptography (Cryptographic Series , No 8). Aegean Park Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

F, Friedman William. Elementary Military Cryptography (Cryptographic Series , No 7). Aegean Park Pr, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Givierge, Marcel. Course in Cryptography (Cryptographic Series , No 19). Aegean Park Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Publishing, Sunshine. Look at Me Loving Cryptography and Shit: Funny Notebook for Cryptography Lovers / Cryptographers, Christmas / Birthday / Appreciation / Thank You Gag Gift for Cryptography Lovers / Cryptographers. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Martin, Keith M. Basic Principles. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0001.

Full text
Abstract:
This chapter serves as an introduction to the environment in which cryptography finds common use today. We discuss the need for cryptography, as well as the basic language and concepts that are used to describe a cryptographic system. We introduce the core security services, such as confidentiality, data integrity, and authentication, which are delivered by cryptography in order to support modern security technologies. We introduce both symmetric and public-key cryptosystems, and discuss the differences between them. Finally, we consider ways in which cryptosystems can be attacked or compromised.
APA, Harvard, Vancouver, ISO, and other styles
24

Smart, Nigel. Cryptography: An Introduction. Mcgraw-Hill College, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Smart, Nigel. Cryptography: An Introduction. Mcgraw-Hill College, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Martin, Keith. Everyday Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.001.0001.

Full text
Abstract:
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient technologies and overwhelming theoretical research. The first part of the book provides essential background, identifying the core security services provided by cryptography. The next part introduces the main cryptographic mechanisms that deliver these security services such as encryption, hash functions, and digital signatures, discussing why they work and how to deploy them, without delving into any significant mathematical detail. In the third part, the important practical aspects of key management are introduced, which is essential for making cryptography work in real systems. The last part considers the application of cryptography. A range of application case studies is presented, alongside a discussion of the wider societal issues arising from use of cryptography to support contemporary cyber security.
APA, Harvard, Vancouver, ISO, and other styles
27

Fagone, Jason. The woman who smashed codes: A true story of love, spies, and the unlikely heroine who outwitted America's enemies. 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

F, Friedman William. Six Lectures Concerning Cryptography and Cryptanalysis (Cryptographic Series , No. 67). Aegean Park Pr, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Cryptography Cryptography Cryptography Cryptography. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Danesi, Marcel. Cryptographic Crimes: The Use of Cryptography in Real and Fictional Crimes. Lang AG International Academic Publishers, Peter, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Danesi, Marcel. Cryptographic Crimes: The Use of Cryptography in Real and Fictional Crimes. Lang AG International Academic Publishers, Peter, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Danesi, Marcel. Cryptographic Crimes: The Use of Cryptography in Real and Fictional Crimes. Lang AG International Academic Publishers, Peter, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Cryptographic Crimes: The Use of Cryptography in Real and Fictional Crimes. Lang AG International Academic Publishers, Peter, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Bos, Joppe, and Martijn Stam, eds. Computational Cryptography. Cambridge University Press, 2021. http://dx.doi.org/10.1017/9781108854207.

Full text
Abstract:
The area of computational cryptography is dedicated to the development of effective methods in algorithmic number theory that improve implementation of cryptosystems or further their cryptanalysis. This book is a tribute to Arjen K. Lenstra, one of the key contributors to the field, on the occasion of his 65th birthday, covering his best-known scientific achievements in the field. Students and security engineers will appreciate this no-nonsense introduction to the hard mathematical problems used in cryptography and on which cybersecurity is built, as well as the overview of recent advances on how to solve these problems from both theoretical and practical applied perspectives. Beginning with polynomials, the book moves on to the celebrated Lenstra–Lenstra–Lovász lattice reduction algorithm, and then progresses to integer factorization and the impact of these methods to the selection of strong cryptographic keys for usage in widely used standards.
APA, Harvard, Vancouver, ISO, and other styles
35

Churchhouse, R. F. Codes and Ciphers: Julius Caesar, the Enigma, and the Internet. Cambridge University Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Churchhouse, R. F. Codes and Ciphers: Julius Caesar, the Enigma, and the Internet. Cambridge University Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Churchhouse, R. F. Codes and Ciphers: Julius Caesar, the Enigma, and the Internet. Cambridge University Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Diepenbroek, Martine. The Spartan Scytale and Developments in Ancient and Modern Cryptography. Bloomsbury Publishing Plc, 2023. http://dx.doi.org/10.5040/9781350281301.

Full text
Abstract:
This book offers a comprehensive review and reassessment of the classical sources describing the cryptographic Spartan device known as the scytale. Challenging the view promoted by modern historians of cryptography which look at the scytale as a simple and impractical ‘stick’, Diepenbroek argues for the scytale’s deserved status as a vehicle for secret communication in the ancient world. By way of comparison, Diepenbroek demonstrates that the cryptographic principles employed in the Spartan scytale show an encryption and coding system that is no less complex than some 20th-century transposition ciphers. The result is that, contrary to the accepted point of view, scytale encryption is as complex and secure as other known ancient ciphers. Drawing on salient comparisons with a selection of modern transposition ciphers (and their historical predecessors), the reader is provided with a detailed overview and analysis of the surviving classical sources that similarly reveal the potential of the scytale as an actual cryptographic and steganographic tool in ancient Sparta in order to illustrate the relative sophistication of the Spartan scytale as a practical device for secret communication. This helps to establish the conceptual basis that the scytale would, in theory, have offered its ancient users a secure method for secret communication over long distances.
APA, Harvard, Vancouver, ISO, and other styles
39

Hill, Tobias. Cryptographer. Faber & Faber, Incorporated, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Fagone, Jason. Woman Who Smashed Codes: A True Story of Love, Spies, and the Unlikely Heroine Who Outwitted America's Enemies. HarperCollins Publishers, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

David, Kahn. The Reader of Gentlemen's Mail: Herbert O. Yardley and the Birth of American Codebreaking. Yale University Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Fagone, Jason. The Woman Who Smashed Codes: A True Story of Love, Spies, and the Unlikely Heroine Who Outwitted America's Enemies. HarperCollins Publishers and Blackstone Audio, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Famous Cryptographers. Rosen Young Adult, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

The mathematics of ciphers: Number theory and RSA cryptography. A K Peters, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Coutinho, S. C. The Mathematics of Ciphers: Number Theory and RSA Cryptography. AK Peters, Ltd., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Mathematics of Ciphers: Number Theory and RSA Cryptography. CRC Press LLC, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Mathematics of Ciphers: Number Theory and RSA Cryptography. CRC Press LLC, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

The cryptographer. Bloomsbury, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

The cryptographer. Faber and Faber, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Freedman, Jeri. Famous Cryptographers. Rosen Publishing Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!