Geometry.Net - the online learning center
Home  - Science - Cryptography
e99.com Bookstore
  
Images 
Newsgroups
Page 4     61-69 of 69    Back | 1  | 2  | 3  | 4 
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Cryptography:     more books (100)
  1. Algebraic Geometry in Coding Theory and Cryptography by Harald Niederreiter, Chaoping Xing, 2009-09-21
  2. Cryptography & Network Security (McGraw-Hill Forouzan Networking) by Behrouz Forouzan, 2007-02-28
  3. A Course in Number Theory and Cryptography (Graduate Texts in Mathematics) by Neal Koblitz, 1994-09-02
  4. An Introduction to Cryptography, Second Edition (Discrete Mathematics and Its Applications) by Richard A. Mollin, 2006-09-18
  5. Elementary Number Theory, Cryptography and Codes (Universitext) by M. Welleda Baldoni, Ciro Ciliberto, et all 2008-12-09
  6. Contemporary Cryptography (Artech House Computer Security503) by Rolf Oppliger, 2005-04-30
  7. Introduction to Cryptography with Java Applets by David Bishop, 2002-12
  8. Cryptography for Developers by Tom St Denis, 2007-01-15
  9. .NET Security and Cryptography by Peter Thorsteinson, G. Gnana Arun Ganesh, 2003-08-28
  10. Cryptography for Visual Basic(r) : A Programmer's Guide to the Microsoft(r) CryptoAPI by Richard Bondi, 2000-09-01
  11. Protecting Information: From Classical Error Correction to Quantum Cryptography by Susan Loepp, William Wootters, 2006-07-31
  12. Finite Fields: Theory and Computation: The Meeting Point of Number Theory, Computer Science, Coding Theory and Cryptography (Mathematics and Its Applications) by Igor Shparlinski, 2010-11-02
  13. Coding Theory and Cryptography: The Essentials, Second Edition (Pure and Applied Mathematics) by D.C. Hankerson, Gary Hoffman, et all 2000-08-04
  14. Foundations of Cryptography: A Primer (Foundations and Trends in Theoretical Computer Science,) by Oded Goldreich, 2005-04-05

61. Cryptography And Network Security, Second Edition
Computer Security and cryptography. At the Australian Defence Force Academy, University College, UNSW. Includes ppt slides and lab exercises.
http://williamstallings.com/Security2e.html
Technical Resources and Course Web Site for
Cryptography and Network Security: Principles and Practice, Second Edition
by William Stallings
Winner of the 1999 Award for the best Computer Science and Engineering textbook, awarded by the Text and Academic Authors Association, Inc.
Last Updated: Friday, February 9, 2007
This site is intended to provide support for instructors and students using the book. For more information about the book, see the Prentice Hall Page . Also, see Robert Slade's book review and IEEE Cipher review
Useful Web Sites
A chapter-by-chapter list of related web sites . This includes all active sites listed in the book, plus other useful sites. Suggestions welcome.
Course Support Materials
Student Resource Site : Help and advice for the long-suffering, overworked student.
Errata sheet
: Latest list of errors, updated at most monthly. File name is Errata-Security2e-mmyy. If you spot any errors, please report them to
Viewgraphs
: On-line transparency masters of some of the figures from the book in PDF (Adobe Acrobat) format.
Tables
: On-line transparency masters of all the tables from the book in PDF format.

62. Elliptic Curve Cryptography FAQ V1.12 22nd December 1997
Explains the difference between an elliptical curve and an ellipse. Discusses fields, applications, choosing a fixed point, and related topics.
http://www.cryptoman.com/elliptic.htm
Elliptic curve cryptography FAQ v1.12 22nd December 1997
by George Barwood
(1) What is an elliptic curve?
Well for a start, it is not the same as an ellipse! But to be more positive: from school mathematics, you probably know the equation for a circle centred on the (a,b) of radius r, which is (x-a)^2 + (y-b)^2 = r^2 where x, y, a, b and r are real numbers. An elliptic curve is also defined by an equation, but it has the slightly more complicated form: Again x and y are variables, a and b are constants. However, these quantities are not necessarily real numbers, instead they may be values from any field. For cryptographic purposes we always use a "finite" field - that is x, y, a and b are chosen from a finite set of distinct values. [In fact the equation given here is not the most general possible, but it will serve for the purposes of this FAQ, and as far as I know for all cryptographic purposes.]
(2) What is a field?
The familiar examples of fields are real numbers, complex numbers, rational numbers (fractions) and integers modulo a prime number. The latter is an example of a "finite field". The requirements of a field are normal addition and multiplication, plus the existence of both additive and multiplicative inverses (except that doesn't have a multiplicative inverse). To put it another way, a field has addition, subtraction, multiplication and division - and these operations always produce a result that is in the field, with the exception of division by zero, which is undefined.

63. Cryptography
cryptography, the encoding of messages to render them unreadable by anyone other than their intended recipient(s), is centuries old.
http://www.lincoln.edu/math/rmyrick/ComputerNetworks/InetReference/135.htm
Connected: An Internet Encyclopedia
Cryptography
Up: Connected: An Internet Encyclopedia
Up: Topics
Up: Concepts
Prev: Congestion
Next: Algorithms
Cryptography
Cryptography, the encoding of messages to render them unreadable by anyone other than their intended recipient(s), is centuries old. The "Caesar Cipher" is so named because it was used by Julius Caesar. With the advent of modern computer technology, many of these older ciphers became trivially crackable using brute-force attacks. Modern cryptography, essential to the security of computer networks, is done with complex algorithms implemented on high speed computer systems. Generally speaking, computer cryptographic tasks can be broken into two general categories: encryption and authentication.
Encryption
    Encryption refers to the scrambling of information so that the original message can not be determined by unauthorized recipients. An encryption algorithm is applied to the message, referred to as the plaintext , and a key to produce ciphertext , which ideally appears to be random bits. A decryption algorithm converts the ciphertext back into plaintext, but only if given the correct key. Conventional, or symmetric, algorithms use the same key for both encryption and decryption. Public key algorithms use paired keys, one for encryption and another for decryption.
Authentication
    Authentication is the verification of a message's sender. Authentication requires protecting a message so it can not be altered, usually by attaching to it a

64. Cryonics And Cryptography
Cryonics, cryptography, and Maximum Likelihood Estimation, a paper by Ralph Merkle, Ph.D.
http://www.merkle.com/cryo/cryptoCryo.html
Cryonics , Cryptography, and Maximum Likelihood Estimation
by Ralph C. Merkle Xerox PARC , 3333 Coyote Hill Road, Palo Alto, CA, 94304. This paper was published in the Proceedings of the First Extropy Institute Conference, held at Sunnyvale, California in 1994. Some changes have been made to this version. A more general overview of the technical feasibility of cryonics is available at http://www.merkle.com/cryo/techFeas.html
Introduction
Most people, if they think of cryonics at all, think of Woody Allen in Sleeper , Sigorney Weaver in Aliens , or Mel Gibson in Forever Young . The hero, after spending decades or centuries in the deep freeze, thaws out gradually and somewhat painfully. Rather stiff from the cold, the warmth of the new era slowly penetrates into their chilled limbs until they at last stretch and look about the world with renewed interest and vitality. Not! All in all, our hero is not going to simply thaw out and walk off. And yet the literature on freezing injury, on ischemia, and on the other damage likely caused by a cryonic suspension forced me to conclude that cryonics would almost surely work: how can this be?
Molecules and people
Fundamentally, people are made of molecules. If those molecules are arranged in the right way, the person is healthy. If the're arranged in the wrong way, the person is unhealthy or worse. While a surgeon's knife does indeed rearrange molecular structure, it does so only in the crudest fashion. The living tissue itself is what really arranges and rearranges the intricate and subtle molecular structures that underlie life and health. When the tissue is too badly damaged, when intracellular levels of ATP are too low to provide the energy the tissue needs to function, when its own internal structure is disrupted, it can no longer heal itself. Today's surgical tools, gross and imprecise at the cellular and molecular level, can no more aid in this process than a wrecking ball could be used to repair a Swiss watch.

65. Center For Cryptography, Computer And Network Security
Center for cryptography, Computer and Network Security at University of WisconsinMilwaukee.
http://www.cccns.uwm.edu/
Center for Cryptography,
Computer and Network Security
Home
About
...
Links
Welcome to the Center
Professor
George Davida

Director-CCCNS
UW-Milwaukee
Last updated

66. IFCA
The International Financial cryptography Association (IFCA) was formed to advance the theory and practice of financial cryptography and related fields.
http://ifca.ai/
General
Information Home IFCA Guidelines Directors and Officers Membership Information
about specific
conferences
Website

Website

Website

Proceedings
...
Proceedings
International Financial Cryptography Association The International Financial Cryptography Association (IFCA) was formed to advance the theory and practice of financial cryptography and related fields. IFCA's primary activity is the organization of its annual Financial Cryptography conference, which brings together experts from around the world to foster cooperation and the exchange of ideas.
Financial Cryptography '09 info

67. Cryptography And Encryption
A resource featuring current security news and an introduction to cryptography.
http://www.jjtc.com/Security/crypto.htm
Cryptography and Encryption
Steganography Software Wiki
(add your own) The Codebreakers Research in Cryptography Related Systems Issues Security Newsgroups ...
Hot Sites

Apparel Baby Books Classical Music DVD Electronics Kitchen Magazines Office Products PopularMusic Computers Software Toys Videos Video Games Cell Phones
Amazon Recommends:
Privacy Information
  • Documentation and Information (intro to crypto)
  • PGP - Pretty Good Privacy
    (includes PEM - Privacy Enhanced Mail)
  • Internet Phone Security
  • File Encryption
  • Disk or File System Encryption
  • Society and Cryptography (includes politics)
  • Other cryptography information and links
    Steganography and Digital Watermarking Cryptography and Encryption The Codebreakers Research in Cryptography Related Topics and Issues Documents, News and Publications
  • 68. Introduction To Cryptography
    Introduction to cryptography. * HTML format (chapter 1 only) @; * PDF format (requires Adobe Acrobat Reader). PGPi Home Documentation User s Guide
    http://www.pgpi.org/doc/guide/6.5/en/intro/
    Introduction to Cryptography
    HTML format (chapter 1 only) @
    PDF format (requires Adobe Acrobat Reader
    PGPi Home Documentation User's Guide ... English

    69. Personal Page: Vlastimil Klima, Dr. (In Czech: Vlastimil Klíma)
    Lectures on Applied cryptography at the Faculty of Mathematics and Physics, the first Czech Cryptographic Service Provider for MS WindowsNT (CSPI
    http://cryptography.hyperlink.cz/
    Personal page: Vlastimil Klima , Dr. (In Czech: Vlastimil Klíma)
    Education:
    Charles University in Prague
    Faculty of Mathematics and Physics
    1984: Doctor of Natural Sciences (DSc), Charles University in Prague
    Research area: Security, Cryptology. Certificate of Security Clearance: TOP SECRET (Bezpeènostní provìrka PØÍSNÌ TAJNÉ
    Archives of my publications on cryptology and computer security: MD5 collisions homepage: English Czech
    DN,HDN,SNMAC homepage: English Czech
    PGP attack homepage: English Czech
    SSL attack homepage: English Czech
    Main publications:
  • Vlastimil Klima: Tunnels in Hash Functions: MD5 Collisions Within a Minute , IACR ePrint archive Report 2006/105 , 18 March, 2006, paper : English Czech . The source code is available on a homepage: English Czech IMHO it is the quickest method and program in the world.
  • Vlastimil Klima: Special block cipher family DN and new generation SNMAC-type hash function family HDN , IACR ePrint archive Report 2007/050 , February, 2007, paper: English Czech . Tests, source codes on a homepage: English Czech
  • Vlastimil Klima: About a new generation of block ciphers and hash functions - DN and HDN , SPI 2007, Security and Protection of Information, May 2 – 4, 2007, Brno, Czech Republic, www.unob.cz/spi
  • A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 4     61-69 of 69    Back | 1  | 2  | 3  | 4 

    free hit counter