Search Results - "cryptographer"

Refine Results
  1. 1

    Cryptographic libraries for developers by Moyle, Ed 1973-

    Published 2005
    Book
  2. 2

    The story of codebreaking from ancient ciphers to quantum cryptography by Cimino, Al

    Published 2017
    Subjects: “…Cryptographers…”
    Book
  3. 3
  4. 4

    Cryptographic security solutions for the Internet of Things

    Published 2019
    Table of Contents: “…Patil College of Engineering Akurdi, India -- A review of cryptographic algorithms for the Internet of Things / Issmat Shah Masoodi, University of Kashmir, India, Bisma Javid, University of Kashmir, India…”
    Book
  5. 5

    Cryptographic solutions for secure online banking and commerce

    Published 2016
    Book
  6. 6

    The lost symbol a novel by Brown, Dan 1964-

    Published 2009
    Subjects: “…Cryptographers Fiction…”
    Book
  7. 7

    Handbook of research on modern cryptographic solutions for computer and cyber security

    Published 2016
    Book
  8. 8

    Enhancing cryptographic primitives with techniques from error correcting codes

    Published 2009
    Conference Proceeding Book
  9. 9

    Network and internetwork security principles and practice by Stallings, William

    Published 1995
    Table of Contents: “…Intruders, Viruses, and Worms -- Ch. 7. Cryptographic Algorithms -- Ch. 8. Authentication and Key Exchange -- Ch. 9. …”
    Book
  10. 10

    Cryptography theory and practice by Stinson, Douglas R. (Douglas Robert) 1956-

    Published 2006
    Table of Contents: “…Classical cryptography -- Shannon's theory -- Block ciphers and the advanced encryption standard -- Cryptographic hash functions -- The RSA Cryptosystem and factoring integers -- Public-key cryptography and discrete logarithms -- Signature schemes -- Pseudo-random number generation -- Identification schemes and entity authentication -- Key distribution -- Key agreement schemes -- Public-key infrastructure -- Secret sharing schemes -- Multicast security and copyright protection…”
    Book
  11. 11

    Cryptography and network security principles and practice by Stallings, William

    Published 2014
    Table of Contents: “…Chapter 0 Guide for Readers and Instructors -- Chapter 1 Overview -- Part One Symmetric Ciphers -- Chapter 2 Classical Encryption Techniques -- Chapter 3 Block Ciphers and the Data Encryption Standard -- Chapter 4 Basic Concepts in Number Theory and Finite Fields -- Chapter 5 Advanced Encryption Standard -- Chapter 6 Block Cipher Operation -- Chapter 7 Pseudorandom Number Generation and Stream Ciphers -- Part Two Asymmetric Ciphers -- Chapter 8 More Number Theory -- Chapter 9 Public-Key Cryptography and RSA -- Chapter 10 Other Public-Key Cryptosystems -- Part Three Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- Chapter 12 Message Authentication Codes -- Chapter 13 Digital Signatures -- Part Four Mutual Trust -- Chapter 14 Key Management and Distribution -- Chapter 15 User Authentication -- Part Five Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- Chapter 17 Transport-Level Security -- Chapter 18 Wireless Network Security -- Chapter 19 Electronic Mail Security -- Chapter 20 IP Security -- Appendix A Projects for Teaching Cryptography and Network Security -- Appendix B Sage Examples -- References -- Credits -- Index -- Online Chapters and Appendices1 -- Part Six System Security -- Chapter 21 Malicious Software -- Chapter 22 Intruders -- Chapter 23 Firewalls -- Part seven Legal And Ethical Issues -- Chapter 24 Legal and Ethical Issues -- Appendix C Sage Exercises -- Appendix D Standards and Standards-Setting Organizations -- Appendix E Basic Concepts from Linear Algebra -- Appendix F Measures of Security and Secrecy -- Appendix G Simplified DES -- Appendix H Evaluation Criteria for AES -- Appendix I More on Simplified AES -- Appendix J Knapsack Public-Key Algorithm -- Appendix K Proof of the Digital Signature Algorithm -- Appendix L TCP/IP and OSI -- Appendix M Java Cryptographic APIs -- Appendix N MD5 and Whirlpool Hash Functions -- Appendix O Data Compression Using ZIP -- Appendix P More on PGP -- Appendix Q The International Reference Alphabet -- Appendix R Proof of the RSA Algorithm -- Appendix S Data Encryption Standard (DES) -- Appendix T Kerberos Encryption Techniques -- Appendix U Mathematical Basis of the Birthday Attack -- Appendix V Evaluation Criteria for SHA-3.…”
    Book
  12. 12

    Network security attacks and countermeasures

    Published 2016
    Table of Contents: “…Gowrison -- Countering RSA vulnerabilities and its replacement by ECC: elliptic curve cryptographic scheme for key generation / Behnam Rahnama, Arif Sari, Marwan Yassin Ghafour -- Changing dynamics of network security involving hacking/cracking with next generation firewalls (NGFW) / Alok Vishwakarma, Wafa Waheeda…”
    Book
  13. 13

    Handbook of research on advanced hybrid intelligent techniques and applications

    Published 2016
    Table of Contents: “…Mahantesh, Manjunath Aradhya V N -- Cryptographic techniques based on bio-inspired systems / Petre Anghelescu -- Detailed analysis of ultra low power column compression WALLACE and DADDA multiplier in sub-threshold regime / Priya Gupta, Anu Gupta, Abhijit Asati -- Utilization of classification techniques for the determination of liquefaction susceptibility of soils / J. …”
    Book
  14. 14

    Cryptography for security and privacy in cloud computing by Rass, Stefan, Slamanig, Daniel

    Published 2014
    Book
  15. 15

    An introduction to cryptography by Mollin, Richard A. 1947-

    Published 2007
    Book
  16. 16

    Wireless networks and security issues, challenges and research trends

    Published 2013
    Book
  17. 17

    Multilevel modeling of secure systems in QoP-ML by Ksįeżopolski, Bogdan

    Published 2015
    Book
  18. 18

    Applications of secure multiparty computation

    Published 2015
    Book
  19. 19

    Contemporary cryptology the science of information integrity

    Published 1992
    Book
  20. 20

    An introduction to cryptography by Mollin, Richard A. 1947-

    Published 2000
    Book