Geometry.Net - the online learning center
Home  - Science - Cryptography

e99.com Bookstore
  
Images 
Newsgroups
Page 2     21-40 of 175    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Cryptography:     more books (100)
  1. Cryptography for Dummies by Chey Cobb, 2004-01-30
  2. Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More by John Viega, Matt Messier, 2003-07-14
  3. Cryptography in C and C++, Second Edition by Michael Welschenbach, 2005-05-25
  4. Beginning Cryptography with Java by David Hook, 2005-08-19
  5. Malicious Cryptography: Exposing Cryptovirology by Adam Young, Moti Yung, 2004-02-27
  6. Handbook of Applied Cryptography by Alfred J. Menezes, 1997
  7. Introduction to Cryptography with Coding Theory (2nd Edition) by Wade Trappe, Lawrence C. Washington, 2005-07-25
  8. Foundations of Cryptography: Volume 2, Basic Applications by Oded Goldreich, 2009-09-17
  9. Cryptography and Data Security by Dorothy Elizabeth Robling Denning, 1982-06
  10. Cryptography: An Introduction (Student Mathematical Library, Vol. 18) (Student Mathematical Library, V. 18) by V. V. Yashchenko, 2002-11-21
  11. Cryptography and Network Security: Principles and Practice (3rd Edition) by William Stallings, 2002-08-27
  12. Cryptography Demystified by John Hershey, 2002-08-23
  13. Topics in Geometry, Coding Theory and Cryptography (Algebra and Applications)
  14. Java Cryptography (Java Series) by Jonathan Knudsen, 1998-05-01

21. Cryptography: Scientific Freedom And Human Rights Issues
U.S. Congressional briefing Was held to bring two more issues into the policy discussion scientific freedom to conduct and express cryptographic research, and human rights applications of cryptographic technologies.
http://www.aaas.org/spp/dspp/cstc/briefing/crypto/
A congressional briefing held August 1, 1997
Introductory remarks by Rep. Constance Morella, Chairwoman of the Subcommittee on Technology
T he encryption debate has revolved around issues of industrial competitiveness, personal privacy, and the interests of national security and law enforcement. This congressional briefing was held to bring two more issues into the policy discussion: scientific freedom to conduct and express cryptographic research, and human rights applications of cryptographic technologies. The briefing was "cybercast" live over the Internet by Democracy.net , a joint project of the Center for Democracy and Technology and the Voters Telecommunications Watch designed to explore ways of enhancing citizens participation in the democratic process via the Internet. Visit the Democracy.net web site for the audio and video archive of the event.
SPEAKERS Matt Blaze
Principal Research Scientist

In 1994, Mr. Blaze discovered several weaknesses in the proposed "Clipper" key escrow system. His research areas include cryptology, trust management, and secure hardware. In 1996, he received the Electronic Frontier Foundation Pioneer Award for his contributions to computer and network security.

22. Matt Blaze's Cryptography Resource On The Web - Crypto.com
Information and news about cryptography related legislation in the United States. Very procrypto.Category Society Issues Privacy cryptography......Welcome to crypto.com, Matt Blaze's cryptography resource on the Web. August 21,2001 The Call for Papers for Financial cryptography '02 is available here.
http://www.crypto.com/
mab's stuff:
  • research papers
  • talks
  • bio
  • Trust Management ...
  • FC '02 CFP
    Other links:
  • Halfbakery
  • Ron Rivest
  • Crypto Bibliography
  • CDT Crypto Policy ...
  • EPIC
    Welcome to crypto.com, Matt Blaze's cryptography resource on the Web
    New Stuff: January 22, 2003: For information about my paper on the vulnerability of master keyed mechanical lock systems, click here
    October 23, 2002: Some new papers can be found in the research papers section, including some new material on the relationship between cryptology and mechanical locks.
    December 26, 2001: The list of accepted papers for FC'02 can be found here. For information about the conference, click here
    September 12, 2001: My thoughts on yesterday's tragic events can be found here
    August 21, 2001: The Call for Papers for Financial Cryptography '02 is available here
    August 16, 2001: My declaration in Felten et al vs. RIAA et al can be found here (ASCII text). December 4, 2000: In October, I was part of a group of five security researchers invited by the Justice Department to identify technical issues with the Carnivore system that should be addressed by an outside review. We have just released our analysis of IITRI's draft report on Carnivore; our comments can be found here November 21, 2000:
  • 23. SSH : Support : Cryptography A-Z
    cryptography has become one of the main tools for privacy, trust, access control,electronic payments, corporate security, and countless other fields.
    http://www.ssh.com/support/cryptography/

    Sitemap
    Purchase Download Contact Home Company Products Solutions ... Online Resources
    As we move into an information society, the technological means for global surveillance of millions of individual people are becoming available to major governments. Cryptography has become one of the main tools for privacy, trust, access control, electronic payments, corporate security, and countless other fields.
    The use of cryptography is no longer a privilege reserved for governments and highly skilled specialists, but is becoming available for everyone to make use of.
    ALL INFORMATION HERE IS PROVIDED AS IS, AND THERE IS NO WARRANTY OF ANY KIND, INCLUDING BUT NOT LIMITED TO THE ACCURACY OF THE INFORMATION OR THE LEGALITY OF THE REFERENCED SOFTWARE IN ANY PARTICULAR COUNTRY.
    FAQ contains up-to-date instructions tips about commonly occurring situations that user may encounter when using our products.
    Home
    Company Products Solutions ...
    legal notice
    and

    24. Cryptography FAQ Index
    faqs.org, Search FAQs Show References. cryptography FAQ cryptography-faq/part01
    http://www.faqs.org/faqs/cryptography-faq/
    Search FAQs - Show References Search Subject/Archive Names Search Article Headers Cryptography FAQ
    • cryptography-faq/part01
      Subject: Cryptography FAQ (01/10: Overview)
      Maintainer: crypt-comments@math.ncsu.edu
      Last Posted: 19 Mar 2003 10:52:35 GMT
      Last-modified:
    • cryptography-faq/part02
      Subject: Cryptography FAQ (02/10: Net Etiquette)
      Maintainer: crypt-comments@math.ncsu.edu
      Last Posted: 19 Mar 2003 10:52:35 GMT
      Last-modified:
    • cryptography-faq/part03
      Subject: Cryptography FAQ (03/10: Basic Cryptology)
      Maintainer: crypt-comments@math.ncsu.edu Last Posted: 19 Mar 2003 10:52:36 GMT Last-modified:
    • cryptography-faq/part04 Subject: Cryptography FAQ (04/10: Mathematical Cryptology) Maintainer: crypt-comments@math.ncsu.edu Last Posted: 19 Mar 2003 10:52:36 GMT Last-modified:
    • cryptography-faq/part05 Subject: Cryptography FAQ (05/10: Product Ciphers) Maintainer: crypt-comments@math.ncsu.edu Last Posted: 19 Mar 2003 10:52:36 GMT Last-modified:
    • cryptography-faq/part06 Subject: Cryptography FAQ (06/10: Public Key Cryptography) Maintainer: crypt-comments@math.ncsu.edu Last Posted: 19 Mar 2003 10:52:37 GMT Last-modified:
    • cryptography-faq/part07 Subject: Cryptography FAQ (07/10: Digital Signatures) Maintainer: crypt-comments@math.ncsu.edu

    25. Products And Technologies
    Server Gated cryptography (SGC) overview, FAQ, technical information and related links. (Microsoft)
    http://www.microsoft.com/security/tech/sgc/
    var sContentID = "28001414"; TechNet Home Security
    Security Products and Technologies
    Get up-to-speed on the products and technologies you can deploy to implement and maintain security on your server or in your network. This section includes resources on certificates and certificate services, cryptography, Kerberos, PKI, and various other topics. Quick Resource Guides To Securing Client and Server Systems Security Resource Sections
    Let Microsoft Training Help You Create a Secure Connected Infrastructure
    Discover how Microsoft security training can help you build the skills you need to secure your network at every level. (February 10) More...
    Learn to Design Secure Networks with Microsoft Frameworks
    This three-day course teaches you to design and implement a security design framework, identifying threats and analyzing risks by using the Microsoft Solutions Framework (MSF). It also covers designing a secure solution that encompasses physical resources, computers, accounts, authentication, data, and communication. (February 10) More...

    26. Cryptography FAQ (01/10: Overview)
    Part01 Part02 - Part03 - Part04 - Part05 - Part06 - Part07 - Part08 - Part09 -Part10. cryptography FAQ (01/10 Overview). What is cryptology? cryptography?
    http://www.faqs.org/faqs/cryptography-faq/part01/
    Cryptography FAQ (01/10: Overview)
    cryptography-faq/part01_1048071134@rtfm.mit.edu cryptography-faq/part01_1046174591@rtfm.mit.edu sci.crypt talk.politics.crypto ... talk.answers Subject: Cryptography FAQ (01/10: Overview) Followup-To: poster From: crypt-comments@math.ncsu.edu Organization: The Crypt Cabal Reply-To: crypt-comments@math.ncsu.edu Summary: Part 1 of 10 of the sci.crypt FAQ, Overview. Table of contents, contributors, feedback, archives, administrivia, changes. Date: 19 Mar 2003 10:52:35 GMT X-Trace: 1048071155 senator-bedfellow.mit.edu 3937 18.181.0.29 Archive-name: cryptography-faq/part01 Last-modified: 1999/06/27 This is the first of ten parts of the sci.crypt sci.crypt has been archived since October 1991 on ripem.msu.edu, though these archives are available only to U.S. and Canadian users. Another site is rpub.cl.msu.edu in /pub/crypt/sci.crypt/ from Jan 1992. The sections of this FAQ are available via anonymous FTP to rtfm.mit.edu as /pub/usenet/news.answers/cryptography-faq/part[xx]. The Cryptography FAQ is posted to the newsgroups sci.crypt

    27. Counterpane Labs: Why Cryptography Is Harder Than It Looks
    Crypto should be pretty simple, right? Wrong.
    http://www.counterpane.com/whycrypto.html
    Why Cryptography Is Harder Than It Looks
    by Bruce Schneier CTO and Founder
    Counterpane Internet Security, Inc.

    e-mail: schneier@counterpane.com You can download this essay in Postscript or PDF (Acrobat) format, or as a PalmPilot DOC From e-mail to cellular communications, from secure Web access to digital cash, cryptography is an essential part of today's information systems. Cryptography helps provide accountability, fairness, accuracy, and confidentiality. It can prevent fraud in electronic commerce and assure the validity of financial transactions. It can prove your identity or protect your anonymity. It can keep vandals from altering your Web page and prevent industrial competitors from reading your confidential documents. And in the future, as commerce and communications continue to move to computer networks, cryptography will become more and more vital. But the cryptography now on the market doesn't provide the level of security it advertises. Most systems are not designed and implemented in concert with cryptographers, but by engineers who thought of cryptography as just another component. It's not. You can't make systems secure by tacking on cryptography as an afterthought. You have to know what you are doing every step of the way, from conception through installation. Billions of dollars are spent on computer security, and most of it is wasted on insecure products. After all, weak cryptography looks the same on the shelf as strong cryptography. Two e-mail encryption products may have almost the same user interface, yet one is secure while the other permits eavesdropping. A comparison chart may suggest that two programs have similar features, although one has gaping security holes that the other doesn't. An experienced cryptographer can tell the difference. So can a thief.

    28. Foundations Of Cryptography By Oded Goldreich
    Oded Goldreich. A public domain book available online. Only partially completed.Category Science Math Communication Theory cryptography Theory......Foundations of cryptography (Fragments of a Book). Oded Goldreich. This 1998).See also The Foundations of cryptography An Essay (1997).
    http://theory.lcs.mit.edu/~oded/frag.html
    Foundations of Cryptography (Fragments of a Book)
    Oded Goldreich
    This webpage provides access to the old fragments that are currently superseeded by a book in preparation In general, my webpages at this site (MIT) are no longer updated, and so you way want to look at my updated webpages starting from my homepage (at the Weizmann Institute) Out of 10 chapters planned for the book only 4 exist. Furthermore, these chapters are in preliminary form and I expect them to be full of various mistakes ranging from spelling and grammatical errors to minor technical inaccuracies. I hope and believe that they are no fatal mistakes, but I cannot guarantee this either. Yet, its seems preferable to place these fragments in public domain rather than wait till the original plan is completed.
    • README (preface and organization)
    • Table of Contents [ HTML ] and [ PostScript
    • The fragments are available in six parts (PostScript files), each part having two versions: The one posted in 1995 (denoted v.o. ) to which the above refers, and an on-going revision of it (denoted rev.

    29. Glossary For Internet Cryptography
    Glossary of cryptographic and computer terminology from the book Internet cryptography .
    http://www.visi.com/crypto/inet-crypto/glossary.html
    Basic Glossary from Internet Cryptography
    by Richard E. Smith
    ISBN 0-201-92480-3, Addison Wesley, 1997 Last updated on Thursday, July 25, 2002
    This Site Has Moved!
    You should be redirected to http://www.smat.us/crypto/inet-crypto/glossary.html in a couple of seconds. Richard E. Smith, smith@smat.us

    30. The Polymorphic Cipher - An Article By C. B. Roellgen About Large Keyspace Crypt
    Ultrasecure 10240 bit cryptography for e-mails, text and file archives
    http://www.ciphers.de/bpp/
    About us Products Developers Partners ... Investors The polymorphic cipher PMC
    Author: C. B. Roellgen 20.04.2002 The history of cryptography has shown that unbreakable ciphers had in many cases been cracked shortly after their widespread use had begun. One famous example is the "Enigma" encryption machine used by the Nazis in world war two: British specialists at Bletchley Park had been able to crack the clever permutation code. This resulted in detailed knowledge about most German military operations and in the total loss of the German submarines.
    Fig. 1 The widespread DES algorithm has long been supposed to be unbreakable. In January 1999 a test performed by RSA Data Security, Inc. (San Mateo, Calif., USA) proved that it takes less than 22.25 hours to crack the 56 bit algorithm by brute-force (by trying all 256 possibilities). That was 365 days after the same company needed 41 days for that task! RSA claim to have a much better cipher, which is obviously true. Today a code length of 128 bit is regarded as safe by experts (1000 bit for RSA). Thus, it took just 25 years for the experts to actually double their requirements in key size (which is effectively 10000000000000000000 times more than what was initially regarded "safe"!!!).

    31. North American Cryptography Archives
    A comprehensive archive for cryptography source code, software, liturature and links.Category Science Math cryptography Algorithms......Strong cryptographic software, libraries, and information about cryptography,data security, and privacy. North American cryptography Archives.
    http://www.cryptography.org/
    North American Cryptography Archives
    Are you and the computer(s) you are operating both in the United States of America or Canada? Yes No Are you a citizen of the United States of America, a permanent resident (with "green card") of the United States of America, or a citizen of Canada? Yes No Are you aware of the U. S. Export Administration Regulations and similar Canadian regulations? Yes No If you are not eligible for access to strong cryptographic software in the USA, please see our listing of interesting cryptographic sites outside of North America This CryptRing site owned by Michael Paul Johnson
    Prev 5
    Skip Prev Prev ... List This site is maintained by Michael Paul Johnson , who also maintains a neat Bible links site

    32. Cryptography For Visual Basic: Using Encryption And The CryptoAPI With Visual Ba
    A resource site for Visual Basic developers interested in implementing cryptography or the CryptoAPI.
    http://www.cryptovb.com/
    e n t e r e n t e r

    33. Cryptography Links Outside Of North America
    cryptography Links Outside of North America. Focused Topics cryptographyand Privacy; http//www.funet.fi/pub/crypt/cryptography/;
    http://www.cryptography.org/freecryp.htm
    Cryptography Links Outside of North America
    Here are some selected links to cryptographic information and software available outside of North America, which can be freely downloaded in most countries (including the USA and Canada).

    34. Cryptography And Security
    Explanation of encryption, ECHELON, multiple file encryption software, and why you need encryption.
    http://hermetic.nofadz.com/crypto.htm
    Cryptography and Security Who needs encryption? Anyone who values privacy. The #59 issue of CovertAction Quarterly has an article by New Zealand writer Nicky Hagar about the Global Surveillance Network, which is the means whereby the governments of the U.S.A. and the U.K., and to a lesser extent those of Canada, Australia and New Zealand (the five countries in the UKUSA espionage 'alliance') attempt to eavesdrop on every international telex, fax and email message. This is the ECHELON system , run by the U.S. National Security Agency (NSA). In July 1997 plans were announced to double the capacity of the New Zealand spy station and to tap phone calls as well as non-voice communications (see Spy Power Boost for Secret Station ). The way to foil the NSA eavesdroppers is to encrypt all communications. Their computers are the fastest that U.S. taxpayers' money can buy, but if many more people use encryption the NSA's computers will be overwhelmed by the sheer volume of encrypted traffic.
    These reports suggest that if you use an application program which uses Microsoft's CryptoAPI to encrypt data which you store on your PC then the NSA has a backdoor to that data, that is, the NSA can read what you think you have safely hidden away from their prying eyes.

    35. Delphi Stuff
    Implementations by Dave Shapiro of two symmetric encryption algorithms (Blowfish and DES) and several message digests (MD2, MD4, MD5, SHA1, and RipeMD-160). Freeware with Delphi source code.
    http://www.csd.net/~daves/delphi/
    Delphi Stuff I haven't quite decided what I'm going to do with this page yet. I could include a tips-and-tricks page, or I could have links to other good Delphi sites. For now, I'll just put some of my code up, free for using, making fun of, etc.
    • bmpRot
      A unit for rotating TBitmaps 90, 180, or 270 degrees. Works in D1, D2, D3, and D4. Not entirely optimized, but quick enough. It rotates a 1600x1200 image in 800 msec on my Pentium II (400 MHz).
    • BlockCiphers
      A block cipher class hierarchy. Currently includes TDESCipher and TBlowfishCipher, with more to come soon. The ciphers all descend from TBlockCipher, whose constructor is virtual, allowing for polymorphic instantiation of any cipher you choose. The DES implementation has been heavily optimized with a lot of help from Bob Lee. It encrypts 4.2 megs/sec on my Pentium II. Blowfish has been similarly optimized, encrypting 6.5 megs/sec.
    • TPanZoomPanel
      Here at last, my TPanZoomPanel. This is a descendant of TPanel that can display an image, pan, zoom, and paint on it. You can define a coordinate system at any time, and it will remain true through all the panning and zooming you want.

    36. Products And Technologies
    Describes the difference between the SGC protocol and SSL/TLS. Also covers the implementation of SGC in Netscape products. (Microsoft)
    http://www.microsoft.com/security/tech/sgc/TechnicalDetails.asp
    var sContentID = "28001414"; TechNet Home Security
    Security Products and Technologies
    Get up-to-speed on the products and technologies you can deploy to implement and maintain security on your server or in your network. This section includes resources on certificates and certificate services, cryptography, Kerberos, PKI, and various other topics. Quick Resource Guides To Securing Client and Server Systems Security Resource Sections
    Let Microsoft Training Help You Create a Secure Connected Infrastructure
    Discover how Microsoft security training can help you build the skills you need to secure your network at every level. (February 10) More...
    Learn to Design Secure Networks with Microsoft Frameworks
    This three-day course teaches you to design and implement a security design framework, identifying threats and analyzing risks by using the Microsoft Solutions Framework (MSF). It also covers designing a secure solution that encompasses physical resources, computers, accounts, authentication, data, and communication. (February 10) More...

    37. Thomas William Korner, Korner's Korner, Pleasures Of Counting, T.W.Korner, Mathe
    Lecture notes at Tom Koerner's home page.
    http://www.dpmms.cam.ac.uk/~twk/
    Korner's Korner
    First let me remind you that The Pleasures of Counting is available from all good bookshops. Longer than `With Rod and Line Through the Gobi Desert', funnier than `The Wit and Wisdom of the German General Staff' and with more formulae than `A Brief History of Time' it has already been voted Book of the Year CUP's gleaming modern web site If you wish to read it in German then Michael Basler has produced a splendid translation here Mathematika says `A cracking good tale; buy it for your children and read it yourself.' Mathematics Magazine says `None of "introvert", "extrovert", nor "anchor" appears [in the index.]' Computer Shopper says `a real gem of a book' The Australian's Review of Books says `[a] generous bouquet .... [but] don't think ikebana here' Notices of the AMS says `Make sure to recommend it to your local high school library. If they are slow to purchase it, then donate a copy.' The last quotation is from one of two long reviews accessible via AMS Book (and other) Reviews I have produced a rather simple Pleasures of Counting home page However, the main purpose of this home page is to give access to the most recent version of various collections of well meant advice that I have produced.

    38. Deadlines
    Maintained by Anne Canteaut, INRIA.
    http://www-rocq.inria.fr/codes/Anne.Canteaut/annonces.html
    Prochaines conférences
    Deadlines
    Conférences dont les deadlines sont passés

    39. Python Cryptography Toolkit
    A collection of cryptographic algorithms and protocols, implemented for use from Python. Open Source, Python license
    http://www.amk.ca/python/code/crypto.html
    Home Python Code
    Python Cryptography Toolkit
    Search amk.ca
    Last Modified: 1 Mar 2003 Cryptography toolkit GPG module jwzthreading Medusa ... SANE module The Toolkit is a collection of cryptographic algorithms and protocols, implemented for use from Python. The current release is 1.9alpha5. Among the contents of the package:
    • Hash functions: MD2, MD4, RIPEMD. Block encryption algorithms: AES, ARC2, Blowfish, CAST, DES, Triple-DES, IDEA, RC5. Stream encryption algorithms: ARC4, simple XOR. Public-key algorithms: RSA, DSA, ElGamal, qNEW. Protocols: All-or-nothing transforms, chaffing/winnowing. Miscellaneous: RFC1751 module for converting 128-key keys into a set of English words, primality testing. Some demo programs (currently all quite old and outdated).
    There's a SourceForge project for Python-related cryptography code, the pycrypto project . Use it to report bugs submit patches , and to get a copy of the current CVS tree . See below for a link to the most recent released version.
    Note on Exporting Crypto Code
    With the relaxing of US export controls for encryption software, it's now possible to distribute cryptographic source code and export it from the US, so now anyone in the world can download the Python Cryptography Toolkit. (Note that export controls still apply to binary software, though; if you're an American citizen, please consult the informative links at

    40. Cryptography Archive
    Crypto Glossary Page, cryptography, PGP, and Your Privacy A Short Primer. HonorsSeminar in cryptography, University of Illinois in Chicago.
    http://www.austinlinks.com/Crypto/
    TIME Magazine - The Privacy Thieves Bovine RC5 Cracking Effort Headquarters Browser Security Information on Kevin McCleavey's home page. Ciphers by Ritter Clipper Crypto-Anarchists Overview Cryptographic FTP Sites Netherlands United Kingdom Crypto Glossary Page Cryptography, PGP, and Your Privacy: A Short Primer Cypherpunks Berkeley Archive Vince Cate's Cryptorebel/Cypherpunk Page University of Washington Archive Data Encryption Standard (DES) ... Books with DES Source Code Digital Telephony EFF Digital Telephony Archive epic.org Electronic Privacy Information Center Electronic Frontier Foundation Encryption Policy Resource Page Export Issues Cygnus Archive EFF Crypto Export Archive FTC Workshop on Consumer Privacy Online General ... Glen L. Roberts/Stalker's Home Page Privacy Issues History of Cryptology Francis Bacon as the author of Shakespeare's Works Are There Ciphers in Shakespeare? Honors Seminar in Cryptography, University of Illinois in Chicago Information Liberation Front International Resources International Cryptography Pages International PGP Home Page Crypto Log Internet Security Related Links by Nerd World 'Cookie Cutter' Hideaway.Net

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 2     21-40 of 175    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20

    free hit counter