Search Results - "cryptography"
Suggested Topics within your search.
Suggested Topics within your search.
- Cryptography 44
- Computer security 35
- Computer networks 29
- Security measures 28
- Coding theory 15
- Data encryption (Computer science) 15
- Examinations 6
- mathematics 6
- Penetration testing (Computer security) 5
- Certification 4
- Electronic data processing personnel 4
- Computers 3
- Data transmission systems 3
- Hackers 3
- security measures 3
- Algorithms 2
- Business enterprises 2
- Computer crimes 2
- Computer software 2
- Data encryption ( Computer science ) 2
- Distributed processing 2
- Electronic data processing 2
- Electronic funds transfers 2
- Hacking 2
- History 2
- Information technology 2
- Internet 2
- Mathematics 2
- Number theory 2
- Prevention 2
-
1
Cryptography infosec pro guide
Published 2013Table of Contents: “…The language of cryptography -- History of cryptography -- Components of cryptography -- Algorithms and ciphers -- Hashing and message digests -- Cryptanalysis and code breaking -- Public key infrastructure -- Steganography -- Applied cryptography -- Quantum cryptography -- The future of cryptography.…”
Book -
2
-
3
-
4
-
5
Cryptography theory and practice
Published 2006Table of Contents: “…Classical cryptography -- Shannon's theory -- Block ciphers and the advanced encryption standard -- Cryptographic hash functions -- The RSA Cryptosystem and factoring integers -- Public-key cryptography and discrete logarithms -- Signature schemes -- Pseudo-random number generation -- Identification schemes and entity authentication -- Key distribution -- Key agreement schemes -- Public-key infrastructure -- Secret sharing schemes -- Multicast security and copyright protection…”
Book -
6
Understanding Cryptography : A Textbook for Students and Practitioners /
Published 2010Table of Contents: “…Introduction to Cryptography and Data Security -- Stream Ciphers -- The Data Encryption Standard (DES) and Alternatives -- The Advanced Encryption Standard (AES) -- More About Block Ciphers -- to Public-Key Cryptography -- The RSA Cryptosystem -- Public-Key Cryptosystems Based on the Discrete Logarithm Problem -- Elliptic Curve Cryptosystems -- Digital Signatures -- Hash Functions -- Message Authentication Codes (MACs) -- Key Establishment…”
Book -
7
-
8
-
9
-
10
-
11
Cryptography in the database the last line of defense
Published 2005Subjects: “…Cryptography…”
Book -
12
Introduction to cryptography principles and applications
Published 2007Subjects: “…Cryptography…”
Book -
13
-
14
-
15
-
16
Understanding cryptography a textbook for students and practitioners
Published 2010Subjects: “…Cryptography…”
Book -
17
Applied cryptography protocols, algorithms, and source code in C
Published 2015Subjects: “…Cryptography…”
Book -
18
-
19
-
20


