Cryptography

A method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it.

All categories

Books under this sub-category (34 books)

A Course in Cryptography

Post date: 15 Jul 2016
Notes for an upper-level introductory undergraduate course in Cryptography.
Author(s): Rafael Pass Abhi Shelat
Publication date: 31 Jan 2010
Document Type: Lecture Notes
Tags: Cryptography
 
A Course in Cryptography

A Course in Cryptography

Post date: 15 Jul 2016
Notes for an upper-level introductory undergraduate course in Cryptography.
Author(s): Rafael Pass Abhi Shelat
Publication date: 31 Jan 2010
Document Type: Lecture Notes
Tags: Cryptography


A Course in Discrete Structures

Post date: 14 Jul 2016
An undergraduate course in basic Discrete Mathematics, with applications in Cryptography and Game Theory.
Author(s): Rafael Pass Wei-Lung Dustin Tseng
Publication date: 31 Aug 2011
Document Type: Lecture Notes
Tags: Cryptography Discrete Mathematics Game Theory
 
A Course in Discrete Structures

A Course in Discrete Structures

Post date: 14 Jul 2016
An undergraduate course in basic Discrete Mathematics, with applications in Cryptography and Game Theory.
Author(s): Rafael Pass Wei-Lung Dustin Tseng
Publication date: 31 Aug 2011
Document Type: Lecture Notes
Tags: Cryptography Discrete Mathematics Game Theory


A Graduate Course in Applied Cryptography

Post date: 30 Aug 2016
This book covers many constructions of practical cryptosystems for different tasks in cryptography. It also presents many case studies to survey how deployed systems operate.
Author(s): Dan Boneh Victor Shoup
Publication date: 17 Aug 2015
Document Type: Book
Tags: Cryptography
 
A Graduate Course in Applied Cryptography

A Graduate Course in Applied Cryptography

Post date: 30 Aug 2016
This book covers many constructions of practical cryptosystems for different tasks in cryptography. It also presents many case studies to survey how deployed systems operate.
Author(s): Dan Boneh Victor Shoup
Publication date: 17 Aug 2015
Document Type: Book
Tags: Cryptography


Algorithms for Audio Watermarking and Steganography

Post date: 01 May 2008
Combines digital signal processing, psychoacoustic modeling and communications theory in developing algorithms for audio watermarking and steganography.
Author(s): Nedeljko Cvejic
Publication date: 31 Dec 2004
Tags: Cryptography Signal Processing
 
Algorithms for Audio Watermarking and Steganography

Algorithms for Audio Watermarking and Steganography

Post date: 01 May 2008
Combines digital signal processing, psychoacoustic modeling and communications theory in developing algorithms for audio watermarking and steganography.
Author(s): Nedeljko Cvejic
Publication date: 31 Dec 2004
Tags: Cryptography Signal Processing


An Introduction to Computer Security: The NIST Handbook

Post date: 01 May 2008
This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls.
Author(s): National Institute of Standards and Technology
Publication date: 01 Dec 2006
Document Type: Book
Tags: Computer Security Cryptography Information Security
 
An Introduction to Computer Security: The NIST Handbook

An Introduction to Computer Security: The NIST Handbook

Post date: 01 May 2008
This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls.
Author(s): National Institute of Standards and Technology
Publication date: 01 Dec 2006
Document Type: Book
Tags: Computer Security Cryptography Information Security


Basic Internet Security

Post date: 13 Oct 2016
This book gives hands-on explanations on how to make your digital communication and data more secure and provides you with a basic understanding of the concepts of digital communication and data security.
Editor(s): Adam Hyde
Publication date: 09 May 2011
License: GNU General Public License Version 2
Document Type: Book
Tags: Computer Security Cryptography Information Security
 
Basic Internet Security

Basic Internet Security

Post date: 13 Oct 2016
This book gives hands-on explanations on how to make your digital communication and data more secure and provides you with a basic understanding of the concepts of digital communication and data security.
Editor(s): Adam Hyde
Publication date: 09 May 2011
License: GNU General Public License Version 2
Document Type: Book
Tags: Computer Security Cryptography Information Security


Bitcoin and Cryptocurrency Technologies

Post date: 16 Apr 2016
If you’re looking to truly understand how Bitcoin works at a technical level and have a basic familiarity with computer science and programming, this book is for you. Researchers and advanced students will find the book useful as well.
Author(s): Joseph Bonneau Edward W. Felten Steven Goldfeder Andrew Miller Arvind Narayanan
Publication date: 09 Feb 2016
Document Type: Book
Tags: Cryptography
 
Bitcoin and Cryptocurrency Technologies

Bitcoin and Cryptocurrency Technologies

Post date: 16 Apr 2016
If you’re looking to truly understand how Bitcoin works at a technical level and have a basic familiarity with computer science and programming, this book is for you. Researchers and advanced students will find the book useful as well.
Author(s): Joseph Bonneau Edward W. Felten Steven Goldfeder Andrew Miller Arvind Narayanan
Publication date: 09 Feb 2016
Document Type: Book
Tags: Cryptography


Coding Theory and Cryptography

Post date: 28 Mar 2007
This book concerns elementary and advanced aspects of coding theory and cryptography. Several of the contributions on cryptography describe the work done by the British and their allies during World War II to crack the German and Japanese ciphers.
Author(s): W. D. Joyner
Publication date: 01 Dec 1999
Document Type: Book
Tags: Coding Theory Cryptography
 
Coding Theory and Cryptography

Coding Theory and Cryptography

Post date: 28 Mar 2007
This book concerns elementary and advanced aspects of coding theory and cryptography. Several of the contributions on cryptography describe the work done by the British and their allies during World War II to crack the German and Japanese ciphers.
Author(s): W. D. Joyner
Publication date: 01 Dec 1999
Document Type: Book
Tags: Coding Theory Cryptography


Creating a Robust Form of Steganography

Post date: 02 May 2008
This paper proposes a transform embedding method (STEM) which uses existing ideas from digital watermarking, improving upon them with empirical data to make them suitable for steganography.
Author(s): Joshua Michael Buchanan
Publication date: 01 May 2004
Tags: Cryptography
 
Creating a Robust Form of Steganography

Creating a Robust Form of Steganography

Post date: 02 May 2008
This paper proposes a transform embedding method (STEM) which uses existing ideas from digital watermarking, improving upon them with empirical data to make them suitable for steganography.
Author(s): Joshua Michael Buchanan
Publication date: 01 May 2004
Tags: Cryptography


Cryptanalysis of RSA Using Algebraic And Lattice Methods

Post date: 08 Apr 2008
Studies the security of public key cryptosystems, in particular the RSA public key cryptosystem and several variants.
Author(s): Glenn Durfee
Publication date: 01 Jun 2002
Document Type: Thesis
Tags: Cryptography
 
Cryptanalysis of RSA Using Algebraic And Lattice Methods

Cryptanalysis of RSA Using Algebraic And Lattice Methods

Post date: 08 Apr 2008
Studies the security of public key cryptosystems, in particular the RSA public key cryptosystem and several variants.
Author(s): Glenn Durfee
Publication date: 01 Jun 2002
Document Type: Thesis
Tags: Cryptography


Crypto 101

Post date: 09 May 2016
This book is intended as an introduction to cryptography for programmers of any skill level.
Author(s): Laurens Van Houtven
Publication date: 01 Jan 2016
License: Creative Commons Attribution-NonCommercial 4.0 International
Document Type: Book
Tags: Cryptography
 
Crypto 101

Crypto 101

Post date: 09 May 2016
This book is intended as an introduction to cryptography for programmers of any skill level.
Author(s): Laurens Van Houtven
Publication date: 01 Jan 2016
License: Creative Commons Attribution-NonCommercial 4.0 International
Document Type: Book
Tags: Cryptography


Cryptography and Security in Computing

Post date: 12 Nov 2016
The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms.
Editor(s): Jaydip Sen
Publication date: 07 Mar 2012
License: Creative Commons Attribution 3.0 Unported
Tags: Computer Security Cryptography
 
Cryptography and Security in Computing

Cryptography and Security in Computing

Post date: 12 Nov 2016
The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms.
Editor(s): Jaydip Sen
Publication date: 07 Mar 2012
License: Creative Commons Attribution 3.0 Unported
Tags: Computer Security Cryptography


Cryptography, An Introduction: Third Edition

Post date: 15 Jul 2016
Nigel Smart's Cryptography provides the rigorous detail required for advanced cryptographic studies, yet approaches the subject matter in an accessible style in order to gently guide new students through difficult mathematical topics.
Author(s): Nigel P. Smart
Publication date: 10 Apr 2013
Document Type: Book
Tags: Cryptography
 
Cryptography, An Introduction: Third Edition

Cryptography, An Introduction: Third Edition

Post date: 15 Jul 2016
Nigel Smart's Cryptography provides the rigorous detail required for advanced cryptographic studies, yet approaches the subject matter in an accessible style in order to gently guide new students through difficult mathematical topics.
Author(s): Nigel P. Smart
Publication date: 10 Apr 2013
Document Type: Book
Tags: Cryptography


Fundamentals Of Cryptology

Post date: 23 Jun 2010
An introduction to modern cryptographic methods. Covers classical cryptosystems, stream ciphers, block ciphers, zero-knowledge proofs, secret sharing schemes and authentication codes.
Author(s): Henk C.A. van Tilborg
Publication date: 31 Dec 2000
Document Type: Book
Tags: Cryptography
 
Fundamentals Of Cryptology

Fundamentals Of Cryptology

Post date: 23 Jun 2010
An introduction to modern cryptographic methods. Covers classical cryptosystems, stream ciphers, block ciphers, zero-knowledge proofs, secret sharing schemes and authentication codes.
Author(s): Henk C.A. van Tilborg
Publication date: 31 Dec 2000
Document Type: Book
Tags: Cryptography


Hacking Secret Ciphers with Python: A beginners guide to cryptography and computer programming with Python

Post date: 18 Apr 2016
This book teaches you how to write your own cipher programs and also the hacking programs that can break the encrypted messages from these ciphers.
Author(s): Al Sweigart
Publication date: 14 Apr 2013
License: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported
Document Type: Book
Tags: Cryptography Python
 
Hacking Secret Ciphers with Python: A beginners guide to cryptography and computer programming with Python

Hacking Secret Ciphers with Python: A beginners guide to cryptography and computer programming with Python

Post date: 18 Apr 2016
This book teaches you how to write your own cipher programs and also the hacking programs that can break the encrypted messages from these ciphers.
Author(s): Al Sweigart
Publication date: 14 Apr 2013
License: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported
Document Type: Book
Tags: Cryptography Python


Book Categories