To see the other types of publications on this topic, follow the link: Message cryptography.

Books on the topic 'Message cryptography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 35 books for your research on the topic 'Message cryptography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

E, Smid Miles, Institute for Computer Sciences and Technology. Security Technology Group., and United States. National Bureau of Standards., eds. Message authentication code (MAC) validation system: Requirements and procedures. The Bureau, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Marvin, Miller. Codemaster #2: How to write and decode More secret messages. Scholastic, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Marvin, Miller. Codemaster #2: How to write and decode more top-secret messages. Scholastic, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Marvin, Miller. Codemaster: How to write and decode secret messages. Scholastic, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Blackwood, Gary L. Mysterious Messages. Penguin USA, Inc., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lunde, Paul. The secrets of codes: [understanding the world of hidden messages]. Weldon Owen, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Marvin, Miller. Codemaster #1: How to write and decode secret messages. Scholastic, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Blackwood, Gary. Mysterious messages: A history of codes and ciphers. Scholastic, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ashton, Christina. Codes & ciphers: Hundreds ofunusual and secret ways to send messages. Betterway Books, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ashton, Christina. Codes & ciphers: Hundreds of unusual and secret ways to send messages. Betterway Books, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Marvin, Miller. Codemaster: How to write and decode secret messages. Scholastic, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Wrixon, Fred B. Codes, ciphers & other cryptic & clandestine communication: Making and breaking secret messages from hieroglyphs to the Internet. Black Dog & Leventhal Publishers, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Marvin, Miller. Codemaster #1: How to write and decode top-secret messages. Scholastic, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Clinton), United States President (1993-2001 :. A legislative proposal: Message from the President of the United States transmitting a legislative proposal to protect the privacy, security and safety of the people of the United States through support for the widespread use of encryption, protection of the security of cryptographic keys, and facilitation of access to the plaintest of data for legitimate law enforcement purposes. U.S. G.P.O., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

1946-, Clinton Bill, United States. Congress. House. Committee on the Judiciary, and United States. Congress. House. Committee on Government Reform, eds. A legislative proposal: Message from the President of the United States transmitting a legislative proposal to protect the privacy, security and safety of the people of the United States through support for the widespread use of encryption, protection of the security of cryptographic keys, and facilitation of access to the plaintest of data for legitimate law enforcement purposes. U.S. G.P.O., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

United States. President (1993-2001 : Clinton). A legislative proposal: Message from the President of the United States transmitting a legislative proposal to protect the privacy, security and safety of the people of the United States through support for the widespread use of encryption, protection of the security of cryptographic keys, and facilitation of access to the plaintext of data for legitimate law enforcement purposes. U.S. G.P.O., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Montgomery, Erick. Duke Ellington: A life in music. Houghton Mifflin, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Secret Messages. Touchstone, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Brandreth, Gyles. Writing Secret Codes and Sending Hidden Messages. Sterling Publishing Co., Inc., 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Weller, Janet. Messages in Code (Hello Out There). Tandem Library, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

FIND OUT ABOUT SECRET CODES AND MESSAGES. Treasure press, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

How to Write and Decode Secret Messages (Codemaster). Econo-Clad Books, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

The secrets of codes: Understanding the world of hidden messages. A. & C. Black, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Marvin, Miller. Codemaster #2: How to Write and Decode Secret Messages. Scholastic, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Marvin, Miller. Codemaster #1: How to write and decode secret messages. Scholastic, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Caswell, Deanna. Making Secret Codes and Messages. Black Rabbit Books, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

The book of codes: Understanding the world of hidden messages : an illustrated guide to signs, symbols, ciphers, and secret languages. University of California Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Martin, Keith M. Data Integrity. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0006.

Full text
Abstract:
This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and H
APA, Harvard, Vancouver, ISO, and other styles
29

Hunt, Elizabeth Singer, and Brian Williamson. Secret Agent Training Manual : How to Make and Break Top Secret Messages: A Companion to the Jack and Max Stalwart Adventure Series. Running Press, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Hunt, Elizabeth Singer, and Brian Williamson. Secret Agent Training Manual : How to Make and Break Top Secret Messages: A Companion to the Secret Agents Jack and Max Stalwart Series. Running Press, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Hunt, Elizabeth Singer, and Brian Williamson. Secret Agent Training Manual : How to Make and Break Top Secret Messages: A Companion to the Secret Agents Jack and Max Stalwart Series. Running Press, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Hunt, Elizabeth Singer, and Brian Williamson. Secret Agent Training Manual : How to Make and Break Top Secret Messages: A Companion to the Secret Agents Jack and Max Stalwart Series. Running Press, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Singh, Simon. Codici & segreti. La storia affascinante dei messaggi cifrati dall'antico Egitto a Internet. BUR Biblioteca Univ. Rizzoli, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

(Editor), Stefan Katzenbeisser, and Fabien, A.P. Petitcolas (Editor), eds. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Publishers, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Forouzan, Behrouz A. Data Communications Networking (McGraw-Hill Forouzan Networking). 4th ed. McGraw-Hill Science/Engineering/Math, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!