Cryptography

A method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it.

All categories

Books under this sub-category (35 books)

A Course in Cryptography

Post date: 15 Jul 2016
Notes for an upper-level introductory undergraduate course in Cryptography.
Publication date: 31 Jan 2010
Document Type: Lecture Notes
 
A Course in Cryptography

A Course in Cryptography

Post date: 15 Jul 2016
Notes for an upper-level introductory undergraduate course in Cryptography.
Publication date: 31 Jan 2010
Document Type: Lecture Notes


A Course in Discrete Structures

Post date: 14 Jul 2016
An undergraduate course in basic Discrete Mathematics, with applications in Cryptography and Game Theory.
Publication date: 31 Aug 2011
Document Type: Lecture Notes
 
A Course in Discrete Structures

A Course in Discrete Structures

Post date: 14 Jul 2016
An undergraduate course in basic Discrete Mathematics, with applications in Cryptography and Game Theory.
Publication date: 31 Aug 2011
Document Type: Lecture Notes


A Graduate Course in Applied Cryptography

Post date: 30 Aug 2016
This book covers many constructions of practical cryptosystems for different tasks in cryptography. It also presents many case studies to survey how deployed systems operate.
Publication date: 17 Aug 2015
Document Type: Book
 
A Graduate Course in Applied Cryptography

A Graduate Course in Applied Cryptography

Post date: 30 Aug 2016
This book covers many constructions of practical cryptosystems for different tasks in cryptography. It also presents many case studies to survey how deployed systems operate.
Publication date: 17 Aug 2015
Document Type: Book


Algorithms for Audio Watermarking and Steganography

Post date: 01 May 2008
Combines digital signal processing, psychoacoustic modeling and communications theory in developing algorithms for audio watermarking and steganography.
Publication date: 31 Dec 2004
 
Algorithms for Audio Watermarking and Steganography

Algorithms for Audio Watermarking and Steganography

Post date: 01 May 2008
Combines digital signal processing, psychoacoustic modeling and communications theory in developing algorithms for audio watermarking and steganography.
Publication date: 31 Dec 2004


An Introduction to Computer Security: The NIST Handbook

Post date: 01 May 2008
This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls.
Publication date: 01 Dec 2006
Document Type: Book
 
An Introduction to Computer Security: The NIST Handbook

An Introduction to Computer Security: The NIST Handbook

Post date: 01 May 2008
This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls.
Publication date: 01 Dec 2006
Document Type: Book


Basic Internet Security

Post date: 13 Oct 2016
This book gives hands-on explanations on how to make your digital communication and data more secure and provides you with a basic understanding of the concepts of digital communication and data security.
Publication date: 09 May 2011
License: GNU General Public License Version 2
Document Type: Book
 
Basic Internet Security

Basic Internet Security

Post date: 13 Oct 2016
This book gives hands-on explanations on how to make your digital communication and data more secure and provides you with a basic understanding of the concepts of digital communication and data security.
Publication date: 09 May 2011
License: GNU General Public License Version 2 Document Type: Book


Bitcoin and Cryptocurrency Technologies

Post date: 16 Apr 2016
If you’re looking to truly understand how Bitcoin works at a technical level and have a basic familiarity with computer science and programming, this book is for you. Researchers and advanced students will find the book useful as well.
Publication date: 09 Feb 2016
Document Type: Book
 
Bitcoin and Cryptocurrency Technologies

Bitcoin and Cryptocurrency Technologies

Post date: 16 Apr 2016
If you’re looking to truly understand how Bitcoin works at a technical level and have a basic familiarity with computer science and programming, this book is for you. Researchers and advanced students will find the book useful as well.
Publication date: 09 Feb 2016
Document Type: Book


Coding Theory and Cryptography

Post date: 28 Mar 2007
This book concerns elementary and advanced aspects of coding theory and cryptography. Several of the contributions on cryptography describe the work done by the British and their allies during World War II to crack the German and Japanese ciphers.
Publisher: Springer-Verlag GmbH
Publication date: 01 Dec 1999
Document Type: Book
 
Coding Theory and Cryptography

Coding Theory and Cryptography

Post date: 28 Mar 2007
This book concerns elementary and advanced aspects of coding theory and cryptography. Several of the contributions on cryptography describe the work done by the British and their allies during World War II to crack the German and Japanese ciphers.
Publisher: Springer-Verlag GmbH
Publication date: 01 Dec 1999
Document Type: Book


Computer Science & Information Technology

Post date: 17 Apr 2017
Proceeding from the Fourth International Conference on Computer Science and Information Technology (CoSIT 2017) Geneva, Switzerland, March 25-26, 2017.
Publisher: AIRCC Publishing Corporation
Publication date: 01 Apr 2017
License: Creative Commons Attribution 4.0 International
Document Type: Proceeding
 
Computer Science & Information Technology

Computer Science & Information Technology

Post date: 17 Apr 2017
Proceeding from the Fourth International Conference on Computer Science and Information Technology (CoSIT 2017) Geneva, Switzerland, March 25-26, 2017.
Publisher: AIRCC Publishing Corporation
Publication date: 01 Apr 2017
License: Creative Commons Attribution 4.0 International Document Type: Proceeding


Creating a Robust Form of Steganography

Post date: 02 May 2008
This paper proposes a transform embedding method (STEM) which uses existing ideas from digital watermarking, improving upon them with empirical data to make them suitable for steganography.
Publication date: 01 May 2004
 
Creating a Robust Form of Steganography

Creating a Robust Form of Steganography

Post date: 02 May 2008
This paper proposes a transform embedding method (STEM) which uses existing ideas from digital watermarking, improving upon them with empirical data to make them suitable for steganography.
Publication date: 01 May 2004


Cryptanalysis of RSA Using Algebraic And Lattice Methods

Post date: 08 Apr 2008
Studies the security of public key cryptosystems, in particular the RSA public key cryptosystem and several variants.
Publication date: 01 Jun 2002
Document Type: Thesis
 
Cryptanalysis of RSA Using Algebraic And Lattice Methods

Cryptanalysis of RSA Using Algebraic And Lattice Methods

Post date: 08 Apr 2008
Studies the security of public key cryptosystems, in particular the RSA public key cryptosystem and several variants.
Publication date: 01 Jun 2002
Document Type: Thesis


Crypto 101

Post date: 09 May 2016
This book is intended as an introduction to cryptography for programmers of any skill level.
Publication date: 01 Jan 2016
License: Creative Commons Attribution-NonCommercial 4.0 International
Document Type: Book
 
Crypto 101

Crypto 101

Post date: 09 May 2016
This book is intended as an introduction to cryptography for programmers of any skill level.
Publication date: 01 Jan 2016
License: Creative Commons Attribution-NonCommercial 4.0 International Document Type: Book


Cryptography and Security in Computing

Post date: 12 Nov 2016
The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms.
Publisher: InTech
Publication date: 07 Mar 2012
License: Creative Commons Attribution 3.0 Unported
 
Cryptography and Security in Computing

Cryptography and Security in Computing

Post date: 12 Nov 2016
The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms.
Publisher: InTech
Publication date: 07 Mar 2012
License: Creative Commons Attribution 3.0 Unported


Cryptography, An Introduction: Third Edition

Post date: 15 Jul 2016
Nigel Smart's Cryptography provides the rigorous detail required for advanced cryptographic studies, yet approaches the subject matter in an accessible style in order to gently guide new students through difficult mathematical topics.
Publisher: McGraw-Hill
Publication date: 10 Apr 2013
Document Type: Book
 
Cryptography, An Introduction: Third Edition

Cryptography, An Introduction: Third Edition

Post date: 15 Jul 2016
Nigel Smart's Cryptography provides the rigorous detail required for advanced cryptographic studies, yet approaches the subject matter in an accessible style in order to gently guide new students through difficult mathematical topics.
Publisher: McGraw-Hill
Publication date: 10 Apr 2013
Document Type: Book


Fundamentals Of Cryptology

Post date: 23 Jun 2010
An introduction to modern cryptographic methods. Covers classical cryptosystems, stream ciphers, block ciphers, zero-knowledge proofs, secret sharing schemes and authentication codes.
Publisher: Kluwer Academic Publishers
Publication date: 31 Dec 2000
Document Type: Book
 
Fundamentals Of Cryptology

Fundamentals Of Cryptology

Post date: 23 Jun 2010
An introduction to modern cryptographic methods. Covers classical cryptosystems, stream ciphers, block ciphers, zero-knowledge proofs, secret sharing schemes and authentication codes.
Publisher: Kluwer Academic Publishers
Publication date: 31 Dec 2000
Document Type: Book


Book Categories
Sponsors
Icons8, a free icon pack