Search Results - "cryptographer"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 10
- Security measures 9
- Computer networks 6
- Cryptography 6
- Data encryption (Computer science) 6
- Coding theory 4
- Computers 2
- Cryptographers 2
- Prevention 2
- security measures 2
- Access control 1
- Algebraic number theory 1
- Artificial intelligence 1
- Ciphers 1
- Cloud computing 1
- Computer crimes 1
- Computer network 1
- Computer programming 1
- Computer simulation 1
- Computer software 1
- Cyberterrorism 1
- Data processing 1
- Data protection 1
- Data structures (Computer science) 1
- Electrical engineering 1
- Electronic circuits 1
- Electronic commerce 1
- Electronic funds transfers 1
- English fiction 1
- Error-correcting codes (Information theory) 1
-
1
-
2
The story of codebreaking from ancient ciphers to quantum cryptography
Published 2017Subjects: “…Cryptographers…”
Book -
3
-
4
Cryptographic security solutions for the Internet of Things
Published 2019Table of Contents: “…Patil College of Engineering Akurdi, India -- A review of cryptographic algorithms for the Internet of Things / Issmat Shah Masoodi, University of Kashmir, India, Bisma Javid, University of Kashmir, India…”
Book -
5
-
6
-
7
-
8
Enhancing cryptographic primitives with techniques from error correcting codes
Published 2009Conference Proceeding Book -
9
Network and internetwork security principles and practice
Published 1995Table of Contents: “…Intruders, Viruses, and Worms -- Ch. 7. Cryptographic Algorithms -- Ch. 8. Authentication and Key Exchange -- Ch. 9. …”
Book -
10
Cryptography theory and practice
Published 2006Table of Contents: “…Classical cryptography -- Shannon's theory -- Block ciphers and the advanced encryption standard -- Cryptographic hash functions -- The RSA Cryptosystem and factoring integers -- Public-key cryptography and discrete logarithms -- Signature schemes -- Pseudo-random number generation -- Identification schemes and entity authentication -- Key distribution -- Key agreement schemes -- Public-key infrastructure -- Secret sharing schemes -- Multicast security and copyright protection…”
Book -
11
Cryptography and network security principles and practice
Published 2014Table of Contents: “…Chapter 0 Guide for Readers and Instructors -- Chapter 1 Overview -- Part One Symmetric Ciphers -- Chapter 2 Classical Encryption Techniques -- Chapter 3 Block Ciphers and the Data Encryption Standard -- Chapter 4 Basic Concepts in Number Theory and Finite Fields -- Chapter 5 Advanced Encryption Standard -- Chapter 6 Block Cipher Operation -- Chapter 7 Pseudorandom Number Generation and Stream Ciphers -- Part Two Asymmetric Ciphers -- Chapter 8 More Number Theory -- Chapter 9 Public-Key Cryptography and RSA -- Chapter 10 Other Public-Key Cryptosystems -- Part Three Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- Chapter 12 Message Authentication Codes -- Chapter 13 Digital Signatures -- Part Four Mutual Trust -- Chapter 14 Key Management and Distribution -- Chapter 15 User Authentication -- Part Five Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- Chapter 17 Transport-Level Security -- Chapter 18 Wireless Network Security -- Chapter 19 Electronic Mail Security -- Chapter 20 IP Security -- Appendix A Projects for Teaching Cryptography and Network Security -- Appendix B Sage Examples -- References -- Credits -- Index -- Online Chapters and Appendices1 -- Part Six System Security -- Chapter 21 Malicious Software -- Chapter 22 Intruders -- Chapter 23 Firewalls -- Part seven Legal And Ethical Issues -- Chapter 24 Legal and Ethical Issues -- Appendix C Sage Exercises -- Appendix D Standards and Standards-Setting Organizations -- Appendix E Basic Concepts from Linear Algebra -- Appendix F Measures of Security and Secrecy -- Appendix G Simplified DES -- Appendix H Evaluation Criteria for AES -- Appendix I More on Simplified AES -- Appendix J Knapsack Public-Key Algorithm -- Appendix K Proof of the Digital Signature Algorithm -- Appendix L TCP/IP and OSI -- Appendix M Java Cryptographic APIs -- Appendix N MD5 and Whirlpool Hash Functions -- Appendix O Data Compression Using ZIP -- Appendix P More on PGP -- Appendix Q The International Reference Alphabet -- Appendix R Proof of the RSA Algorithm -- Appendix S Data Encryption Standard (DES) -- Appendix T Kerberos Encryption Techniques -- Appendix U Mathematical Basis of the Birthday Attack -- Appendix V Evaluation Criteria for SHA-3.…”
Book -
12
Network security attacks and countermeasures
Published 2016Table of Contents: “…Gowrison -- Countering RSA vulnerabilities and its replacement by ECC: elliptic curve cryptographic scheme for key generation / Behnam Rahnama, Arif Sari, Marwan Yassin Ghafour -- Changing dynamics of network security involving hacking/cracking with next generation firewalls (NGFW) / Alok Vishwakarma, Wafa Waheeda…”
Book -
13
Handbook of research on advanced hybrid intelligent techniques and applications
Published 2016Table of Contents: “…Mahantesh, Manjunath Aradhya V N -- Cryptographic techniques based on bio-inspired systems / Petre Anghelescu -- Detailed analysis of ultra low power column compression WALLACE and DADDA multiplier in sub-threshold regime / Priya Gupta, Anu Gupta, Abhijit Asati -- Utilization of classification techniques for the determination of liquefaction susceptibility of soils / J. …”
Book -
14
-
15
-
16
-
17
-
18
-
19
-
20


