Geometry.Net - the online learning center
Home  - Science - Cryptography Bookstore
Page 1     1-20 of 175    1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Cryptography:     more books (100)
  1. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition by Bruce Schneier, 1996-10-18
  2. Cryptography Engineering: Design Principles and Practical Applications by Niels Ferguson, Bruce Schneier, et all 2010-03-15
  3. Understanding Cryptography: A Textbook for Students and Practitioners by Christof Paar, Jan Pelzl, 2009-12-10
  4. An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics) by Jeffrey Hoffstein, Jill Pipher, et all 2010-11-02
  5. Cryptography and Network Security: Principles and Practice (5th Edition) by William Stallings, 2010-01-24
  6. Introduction to Modern Cryptography: Principles and Protocols (Chapman & Hall/CRC Cryptography and Network Security Series) by Jonathan Katz, Yehuda Lindell, 2007-08-31
  7. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography by Simon Singh, 2000-08-29
  8. Cryptography Decrypted by H. X. Mel, Doris M. Baker, 2000-12-31
  9. Practical Cryptography by Niels Ferguson, Bruce Schneier, 2003-03-28
  10. Cryptography: A Very Short Introduction (Very Short Introductions) by Fred Piper, Sean Murphy, 2002-07-15
  11. Cryptography: The Science of Secret Writing by Laurence D. Smith, 1955-06-01
  12. Cryptography: Theory and Practice, Third Edition (Discrete Mathematics and Its Applications) by Douglas R. Stinson, 2005-11-01
  13. Introduction to Cryptography with Mathematical Foundations and Computer Implementations (Discrete Mathematics and Its Applications) by Alexander Stanoyevitch, 2010-08-09
  14. Foundations of Cryptography: Volume 1, Basic Tools by Oded Goldreich, 2007-01-18

1. Handbook Of Applied Cryptography
This complete and authoritative reference work is available for download from the web.Category Computers Hacking cryptography...... updates, errata, supplementary information, chapter bibliographies, and other informationfor the 1996 CRC Handbook of Applied cryptography by Menezes, van
Alfred J. Menezes Paul C. van Oorschot and Scott A. Vanstone
CRC Press
ISBN: 0-8493-8523-7
October 1996, 816 pages
Fifth Printing (August 2001)
The Handbook was reprinted (5th printing) in August 2001. The publisher made all the various minor changes and updates we submitted. You can identify the 5th printing of the book by looking for "5 6 7 8 9 0" at the bottom of the page that includes the ISBN number.
You can order the handbook today from any one of these online bookstores:
Sample Chapters
CRC Press has generously given us permission to make all chapters available for free download.
Please read this before downloading any of the chapters
  • Chapter 1 - Overview of Cryptography ps pdf
  • Chapter 2 - Mathematics Background ps pdf
  • Chapter 3 - Number-Theoretic Reference Problems ps pdf
  • Chapter 4 - Public-Key Parameters ps pdf
  • Chapter 5 - Pseudorandom Bits and Sequences ps pdf
  • Chapter 6 - Stream Ciphers ps pdf
  • Chapter 7 - Block Ciphers ps pdf
  • Chapter 8 - Public-Key Encryption ps pdf
  • Chapter 9 - Hash Functions and Data Integrity ps pdf
  • Chapter 10 - Identification and Entity Authentication ps pdf
  • Chapter 11 - Digital Signatures ps pdf
  • Chapter 12 - Key Establishment Protocols ps pdf
  • Chapter 13 - Key Management Techniques ps pdf
  • Chapter 14 - Efficient Implementation ps pdf
  • Chapter 15 - Patents and Standards ps pdf
  • Appendix -

2. Counterpane Labs: Applied Cryptography
Bruce Schneier. A comprehensive tutorial and reference but a little light on mathematical theory.
Applied Cryptography
Second Edition
By Bruce Schneier
An introduction to cryptography for all ages There are reviews of Applied Cryptography in Tal Cohen's Bookshelf Slashdot , and SunWorld
High resolution cover shots
and second editions "...the best introduction to cryptography I've ever seen.... The book the National Security Agency wanted never to be published...."
Wired Magazine "...monumental...the definitive work on cryptography for computer programmers..."
Dr. Dobb's Journal "...easily ranks as one of the most authorative in its field."
PC Magazine "...the bible of code hackers."
The Millennium Whole Earth Catalog More Reviews Order Info Wiley has published a corrected printing of Applied Cryptography, 2nd ed. They didn't correct everything, only changes that didn't affect page breaks. Still, I counted over 250 individual corrections. And only a dozen errors remaining. The fifth printing or greater is the corrected version. To find what printing you own, turn to page iv (it's opposite the "Contents in Brief" page). The last line (under "Printed in the United States of America") is a series of numbers, counting down from 10. The lowest number is the printing. You have a fifth printing if your last line looks like: If the lowest number is lower than 5, you have an uncorrected printing.

3. Cryptography
Directory of organizations, publications and newsgroups on the topic of cryptography, encryption and privacy. Bruce Schneier's Applied cryptography (2nd Ed.) is the crypto Bible for the professional engineer and interested layman.
Up to Francis Litterio's Home Page
Up to The World Wide Web Virtual Library
There are two kinds of cryptosystems: symmetric and asymmetric . Symmetric cryptosystems use the same key (the secret key) to encrypt and decrypt a message, and asymmetric cryptosystems use one key (the public key) to encrypt a message and a different key (the private key) to decrypt it. Assymetric cryptosystems are also called public key cryptosystems. Symmetric cryptosystems have a problem: how do you transport the secret key from the sender to the recipient securely and in a tamperproof fashion? If you could send the secret key securely, then, in theory, you wouldn't need the symmetric cryptosystem in the first place because you would simply use that secure channel to send your message. Frequently, trusted couriers are used as a solution to this problem. Another, more efficient and reliable solution is a public key cryptosystem, such as RSA , which is used in the popular security tool PGP sci.crypt and sci.crypt.research

4. CDT Encryption Issues Page
Note U.S. encryption export laws, and read court cases setting precedents for intellectual privacy and cryptography. Follow a timeline of national policy changes. A Glossary of Cryptographic Terms. Milestones of cryptography (1997 to present)
Join With CDT in Making an Impact on Internet Policy!

  • Pending legislation from the 107th Congress
  • Background on legislation from the 106th Congress
  • Background on legislation from the 105th Congress
  • Congressional voting records U.S. Policy
  • Current Policy
  • Clinton Administration Initiatives
  • US Court Cases Introduction
  • Our " What is Crypto? " Guide
  • A Glossary of Cryptographic Terms
  • Milestones of Cryptography (1997 to present)
  • Links and Resources
  • Why CALEA is not a precedent for domestic encryption controls Publications

    Concerns about the lack of security online and potential loss of privacy prevent many computer users from realizing the full potential of the Internet. Encryption systems, which scramble electronic communications and information, allow users to communicate on the Internet with confidence, knowing their security and privacy are protected. But the US government blocks export of strong encryption, limiting its widespread use. HEADLINES House Passes Money Laundering Bill; Senator Drops Call for Crypto Controls - The House of Representatives on Wednesday, Oct. 17 passed an amended version of H.R. 3004 - the Financial Anti-Terrorism Act of 2001. Stripped from the bill was a prohibition of Internet gambling and measures that raised civil liberties concerns such as asset forfeiture and warrantless searches of outgoing international mail. Also this week, Senator Judd Gregg (R-NH) backed off his call for anti-encryption mandates.
  • 5. Ronald L. Rivest : Cryptography And Security
    Offers cryptographic research and system design. Learn about various products and conferences.
    Cryptography and Security
    This page contains pointers to other web pages dealing with cryptography and security, organized into the following sections: ((Please send additions and corrections to; thanks to Anselm Blumer for numerous improvements!))
    (Also see the IACR Calendar and the Cipher Newsletter calendar
    Other compilations of links

    6. RSA Laboratories | Cryptography FAQ
    RSA Security present this detailed, searchable FAQ on all aspects of cryptography. Read it online or download the whole thing in Acrobat format.
    RSA Security Home RSA Laboratories Crypto FAQ Introduction Cryptography Techniques in Cryptography Applications of Cryptography ... Glossary RSA Laboratories' Frequently Asked Questions About Today's Cryptography, Version 4.1
    Section Index


    Chapter 1 Introduction

    Chapter 2 Cryptography
    Appendix B Glossary
    Comments on the FAQ are encouraged. Address correspondence to RSA BSAFE Crypto-C, RSA BSAFE Crypto-J, Keon Desktop, MD2, MD4, MD5, RC2, RC4, RC5, RC6, RSA, and SecurID are trademarks or registered trademarks of RSA Security Inc. Other products and names are trademarks or registered trademarks of their respective owners. For permission to reprint or redistribute in part or in whole, send e-mail to or contact your RSA Security representative. How to cite this document:
    Author: RSA Laboratories
    Title: RSA Laboratories' Frequently Asked Questions About Today's Cryptography, Version 4.1
    RSA Security Inc.

    7. RSA Laboratories | Public Key Cryptography Standards (PKCS)
    The official site for PKCS. The standards are available in ASCII, Word, and PostScript formats. (RSA Laboratories)
    RSA Security Home RSA Laboratories PKCS Documents Mailing Lists Questions Workshops ... PKCS #1 v2.1 is now available. Public-Key Cryptography Standards The Public-Key Cryptography Standards are specifications produced by RSA Laboratories in cooperation with secure systems developers worldwide for the purpose of accelerating the deployment of public-key cryptography. First published in 1991 as a result of meetings with a small group of early adopters of public-key technology, the PKCS documents have become widely referenced and implemented. Contributions from the PKCS series have become part of many formal and de facto standards, including ANSI X9 documents, PKIX, SET, S/MIME, and SSL. Further development of PKCS occurs through mailing list discussions and occasional workshops, and suggestions for improvement are welcome. For more information, contact Contributions for PKCS are welcome! Please read our contribution agreement.

    8. EPIC Archive - Cryptography Policy
    Electronic Privacy Information Center furnishes links to recent cryptography legislation, news and regulations.
    Cryptography Policy
    Media Coverage of Recent Proposals Previous News Reports Policy Areas ... Other Materials In the wake of the terrorist attacks in New York City and Washington D.C. on September 11, 2001, there have been renewed calls among some lawmakers for restrictions on the use and availability of strong encryption products. In Congressional floor statements on September and , Senator Judd Gregg (R-NH) called for a global "new regime" in the area of encryption which would grant law enforcement access to private keys. Sen. Gregg has now stated, however, that he does not intend to introduce a bill to give effect to this proposal. Civil liberties and privacy advocates strongly oppose any attempts to require key escrow, key recovery or other means of accessing encryption keys, arguing that they are an unjustified restriction of individuals' fundamental privacy rights, detrimental to security, costly, subject to massive abuse, and ultimately ineffective crime prevention methods. Technology and security experts also oppose any restricitons on encryption, arguing that they would damage comsumer trust in e-commerce transactions. Media Coverage of Recent Proposals

    9. Cryptography - An Overview
    cryptography algorithms and implementations.
    An Overview Introduction Techniques Algorithms Implementations Algorithms Java Applets Applications Research Standards Papers Attacks More ... News Links About

    10. Java(TM) Cryptography Extension (JCE)
    Provides framework and implementations for encryption, key generation and key agreement, and Message Authentication Code (MAC) algorithms.

    Advanced Search

    Downloads Documentation ... Java BluePrints
    Printable Page
    Java TM Cryptography Extension (JCE)
    The Java TM Cryptography Extension (JCE) is a set of packages that provide a framework and implementations for encryption, key generation and key agreement, and Message Authentication Code (MAC) algorithms. Support for encryption includes symmetric, asymmetric, block, and stream ciphers. The software also supports secure streams and sealed objects. JCE is designed so that other qualified cryptography libraries can be plugged in as service providers, and new algorithms can be added seamlessly. (Qualified providers are signed by a trusted entity.)

    11. Cryptography Research, Inc.
    (logo), cryptography Research, Inc. Leader in Advanced Cryptosystems, Searchour site Home. “cryptography Research gets my highest recommendation.”.
    Search our site: Home
    Illusions of Security

    President Paul Kocher speaks about how Moore's Law and increasing system complexity impact the design of secure systems at the USENIX 2002 Security Symposium. Meet the Cryptography Research Team
    CRI actively participates in academic and applied security conferences. Click here to see upcoming conferences where you can meet members of the technical team. Differential Power Analysis
    DPA is a serious issue affecting smartcards and many other crypto devices. Click here for information on this new class of attacks discovered by researchers at Cryptography Research and for the paper presented at Crypto '99. Click here for information on timing attack cryptanalysis, a related subject pioneered by Cryptography Research. Secure Sockets Layer 3.0
    Information on this protocol designed by Cryptography Research President Paul Kocher with Phil Karlton and Alan Frier.

    12. Quantum Computation, Cryptography At Los Alamos National Laboratory
    descibes the work at Los Alamos National Laboratory, operated by the University of California for the US Department of Energy

    13. Differential Power Analysis (DPA) | Cryptography Research, Inc.
    (logo), cryptography Research, Inc. Leader in Advanced Cryptosystems,Search our site Acrobat PDF version here). cryptography Research, Inc.
    Search our site: Home Resources White Papers Differential Power Analysis (DPA) WHITE PAPERS RESEARCH LINKS CONF. PAPERS
    Differential Power Analysis (DPA) is a new class of attacks discovered by researchers at Cryptography Research in San Francisco. DPA affects the security of smart cards and other cryptographic devices. Company Services Technology ...

    14. City In The Sky - The Delphi Cryptography Page
    Implementations by Dave Barton of many of the most useful symmetric encryption algorithms (Blowfish, Twofish, IDEA, Rijndael, Serpent, etc.) and message digests (RipeMD160, SHA-1, Tiger, etc). Freeware with Delphi source code.
    Counter: Reset on 15/07/02 with over 115,000 hits since Nov '98 The Delphi Cryptography Page The Science of Secrecy. I have been interested in cryptography for about 4-5 years now and part of my contribution to the advancement in this area is the cryptographic component library DCPcrypt . The project stalled about 2 years ago but now is back on track! DCPcrypt v2 for Delphi, C++ Builder and Kylix DCPcrypt is an open source library of cryptographic components (encryption and hash algorithms) for Borland Delphi 4, 5, 6, 7, C++ Builder (3?), 4, 5, 6 and Kylix 1, 2 for Linux. Although the library itself is open source, some of the algorithms within the package require licensing from the respective patent holders. The idea behind DCPcrypt is that it should be possible to "drop in" any algorithm implementation to replace another with minimum or no code changes. To aid in this goal all cryptographic components are descended from one of several base classes, TDCP_cipher for encryption algorithms and TDCP_hash for message digest algorithms. DCPcrypt v2 contains full implementations of the following algorithms: Encryption Algorithms Hash Algorithms

    15. Elliptic Curve Cryptography
    Elliptic Curve cryptography. On this page What is an Elliptic Curve? Whydo we care? So what's a group? Is Elliptic Curve cryptography Safe?
    Elliptic Curve Cryptography On this page: What is an Elliptic Curve? Why do we care? So what's a group? Elliptic Curve Groups ... References for Elliptic Curves On this site: SPEKE
    A strong method for password verification. A Puzzle
    Strong vs. weak methods for verifying passwords. Links
    Research papers on strong password verification. About Integrity Sciences, Inc.
    Corporate history, products, and services. Contact us
    Ask how we can meet your development needs. Contents
    A list of everything on this site.
    What is an Elliptic Curve?
    The study of elliptic curves is an important branch of mathematics. Elliptic curves are simple functions that can be drawn as gently looping lines in the (x,y) plane. Very simple. Basic high school stuff. But wierd and interesting things happen when mathematicians study the points where the curve exactly crosses integer (x,y) coordinates. Although the study of elliptic theory is far beyond what normal people will experience in school, the field has been well studied by mathematicians for many years, and in the latter half of the 20th century it has yielded some very significant results. Elliptic Curve Cryptography is just one application of elliptic curve theory.
    Why do we care?

    16. The Polymorphic Cipher - An Article By C. B. Roellgen About Large Keyspace Crypt
    Huge keysize cryptography.
    About us Products Developers Partners ... Investors The polymorphic cipher PMC
    Author: C. B. Roellgen 20.04.2002 The history of cryptography has shown that unbreakable ciphers had in many cases been cracked shortly after their widespread use had begun. One famous example is the "Enigma" encryption machine used by the Nazis in world war two: British specialists at Bletchley Park had been able to crack the clever permutation code. This resulted in detailed knowledge about most German military operations and in the total loss of the German submarines.
    Fig. 1 The widespread DES algorithm has long been supposed to be unbreakable. In January 1999 a test performed by RSA Data Security, Inc. (San Mateo, Calif., USA) proved that it takes less than 22.25 hours to crack the 56 bit algorithm by brute-force (by trying all 256 possibilities). That was 365 days after the same company needed 41 days for that task! RSA claim to have a much better cipher, which is obviously true. Today a code length of 128 bit is regarded as safe by experts (1000 bit for RSA). Thus, it took just 25 years for the experts to actually double their requirements in key size (which is effectively 10000000000000000000 times more than what was initially regarded "safe"!!!).

    17. Hawaii Vacations - Hawaii Vacation Packages - Hawaii Tourism
    that have nothing to do with cryptography! Category Travel
    Site of the day
    Research great vacations with TripAdvisor
  • Hawaii Vacations
  • Las Vegas Vacations
  • Las Vegas Hotels
  • Florida Vacations/Disneyland Vacations ...
  • Paris Hotels Read reviews and great unbiased articles about where to go, where to stay and what to do when vacationing in Hawaii and other wonderful vacation spots. Hello all... I'm sorry, but this site no longer hosts PGP and RSA information. You can check out some fun links that I have collected though... that have nothing to do with cryptography!
    Category: Travel
  • TripAdvisor: Best site for Hotel Reviews , and great vacation information
    This site features reviews and tons of articles talking about where to go, where to stay, and what to do when on vacation.
    Category: Fun
  • Sagittal Software Company : Best site for sending handwritten emails
    Pick a handwriting style, and send a friend a personal note...
  • 18. Visual Basic Instinct : Cryptography
    Explains cryptography from the Visual Basic point of view. Includes custom controls and DLLs for download.

    19. SSH : Support : Cryptography A-Z
    Provides resources dealing with encryption, decryption, cryptanalysis and steganography. Find software and related tools. people are becoming available to major governments. cryptography has become one of the main tools for privacy, trust,

    Purchase Download Contact Home Company Products Solutions ... Online Resources
    As we move into an information society, the technological means for global surveillance of millions of individual people are becoming available to major governments. Cryptography has become one of the main tools for privacy, trust, access control, electronic payments, corporate security, and countless other fields.
    The use of cryptography is no longer a privilege reserved for governments and highly skilled specialists, but is becoming available for everyone to make use of.
    FAQ contains up-to-date instructions tips about commonly occurring situations that user may encounter when using our products.
    Company Products Solutions ...
    legal notice

    20. Cryptography Theory And Practice
    Douglas Stinson. Subtitled "Discrete Mathematics and Its Applications". Written with more Category Science Math Communication Theory cryptography Books......cryptography Theory and Practice. the book's cover. Translations. cryptographyTheory and Practice has been translated into French by Serge Vaudenay.
    Cryptography Theory and Practice
    last modified March 27, 2000 This is the (old) web page for the first edition of the book. A second edition has now been published, and its web page is here This cryptography textbook by Doug Stinson was published in March, 1995, by CRC Press, Inc
    It was reprinted with corrections in late 1996: click here
    This home page contains the following sections:
    The Fourth Printing
    At the end of Novermber, 1996, the book was reprinted with corrections. This is the fourth printing of the book. (You can check which printing of the book you have by looking at the second last line of the back of the cover page. The first number in the sequence specifies the printing. For example, the fourth printing looks like 4 5 6 7 8 9 0.) The following are the (only) changes in the fourth pringing:

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 1     1-20 of 175    1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20

    free hit counter