Geometry.Net - the online learning center
Home  - Science - Cryptography

e99.com Bookstore
  
Images 
Newsgroups
Page 6     101-120 of 175    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Cryptography:     more books (100)
  1. Algorithmic Cryptanalysis (Chapman & Hall/CRC Cryptography and Network Security Series) by Antoine Joux, 2009-06-15
  2. Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications) by Lawrence C. Washington, 2008-04-03
  3. Encyclopedia of Cryptography and Security
  4. Public Key Cryptography
  5. Cryptanalysis of RSA and Its Variants (Chapman & Hall/CRC Cryptography and Network Security Series) by M. Jason Hinek, 2009-07-21
  6. User's Guide To Cryptography And Standards (Artech House Computer Security) by Alex W. Dent, Chris J. Mitchell, 2004-10-31
  7. Cryptography: A New Dimension in Computer Data Security by Carl Meyer, S. M. Matyas, 1982-09
  8. Quantum Cryptography and Secret-Key Distillation by Gilles Van Assche, 2006-07-17
  9. The LLL Algorithm: Survey and Applications (Information Security and Cryptography)
  10. Elliptic Curves: Number Theory and Cryptography (Discrete Mathematics and Its Applications) by Lawrence C. Washington, 2003-05-28
  11. Cryptography's Role in Securing the Information Society by Committee to Study National Cryptography Policy, National Research Council, 1996-10-25
  12. Number-theoretic Algorithms in Cryptography (Translations of Mathematical Monographs) by O. N. Vasilenko, 2006-12-05
  13. The Mathematics of Ciphers: Number Theory and RSA Cryptography by S.C. Coutinho, 1999-01-15
  14. Quantum Communications and Cryptography (Optical Science and Engineering)

101. Learning About Cryptography
A basic introduction to cryptography ciphers, keys, keyspace, strength, cryptanalysis,etc. A Ciphers By Ritter page. Learning About cryptography.
http://www.ciphersbyritter.com/LEARNING.HTM

102. Interhack
A group of technology researchers specializing in large scale system development, cryptography, privacy, and security.
http://www.interhack.net/

103. Crypto-Log Internet Guide To Cryptography
CryptoLog, the Internet Guide to cryptography, is an annotated collection ofpointers to everything available on the net/web about cryptography (programs
http://www.uni-mannheim.de/studorg/gahg/PGP/cryptolog1.html

104. Cryptography Decrypted
Mel and Baker. Divided into four parts, secret keys and secret key methods, public and private keys, how keys are distributed through digital certificates, and three realworld systems.
http://cseng.aw.com/book/0,3828,0201616475,00.html

105. Financial Cryptography 2001
Financial cryptography '01. General Chair, Stuart Haber. Sponsorship Chair, BarbaraFox. FC01 is organized by the International Financial cryptography Association.
http://fc01.ai/

106. IEEE P1363 Standard Specifications For Public Key Cryptography
Standard specifications for public-key cryptography.Category Science Math cryptography Algorithms Public Key......The IEEE P1363 Home Page. Standard Specifications For PublicKey cryptography. OtherKinds of Public-Key cryptography Potential future standardization projects.
http://grouper.ieee.org/groups/1363/

107. Cryonics And Cryptography
Cryonics, cryptography, and Maximum Likelihood Estimation. In cryptography,the person who wants to send a secret message transforms it.
http://www.merkle.com/merkleDir/cryptoCryo.html

108. Best Possible Privacy
10240 bit Militarygrade cryptography.
http://www.ciphers.de/bpp/bpp15.html

109. Electronic Commerce Policy Electronic Commerce Task Force
Security and cryptography Security and cryptography. The benefits of cryptographyfor electronic commerce, privacy protection and crime prevention are clear.
http://e-com.ic.gc.ca/english/crypto/

110. Bokler Software
Commercial site for Bokler Software's cryptographic software components for Windows® developers. The site also contains information on the fundamentals of cryptography and inclusion in program code.
http://www.bokler.com/resrcs_1.html

111. Lanaki Lesson 1
CLASSICAL cryptography COURSE BY LANAKI September 27, 1995 LECTURE 1 SIMPLE SUBSTITUTION. (2) The determination of the general system of cryptography employed.
http://www.fortunecity.com/skyscraper/coding/379/lesson1.htm

112. Cryptography And Information Security / Cryptography And
cryptography and Information Security Research Group. Top row (leftto right) Ueli Maurer, Martin Hirt Middle row (ltr) Renato
http://www.crypto.ethz.ch/

113. StreamSec StrSecII
A collection of optimized cryptography components and routines for Delphi 46. The integrated ASN.1 support allows building of X.509 certificates using native Delphi code. Also implements 3DES, Twofish, and Rijndael (AES) in ECB, CBC, OFB, CFB, CTR, PCFB and ABC modes.
http://www.streamsec.com/prod_strsec2.asp

114. Cryptography's Role In Securing The Information Society
cryptography's. Role. In. Securing The. Information. Society. 1 GROWING VULNERABILITYIN THE INFORMATION AGE; 2 cryptography ROLES, MARKET, AND INFRASTRUCTURE;
http://www.nap.edu/readingroom/books/crisis/

115. WCC 2001 - International Workshop On Coding And Cryptography
Paris, 812 January 2001
http://www-rocq.inria.fr/codes/WCC2001/

116. Logi.crypto
Formerly Cryptonite, a pure java package for strong cryptography. It supplies RSA (usable outside of North America), DES, TripleDES implementation as well as other utility classes. Open Source, GPL/Commercial
http://logi.org/logi.crypto/

117. Cryptography Pointers
Pseudorandom Functions Boolean functions. PublicKey cryptography, PKCBased on Some Special Mathematical Structures. Public-Key Encryption
http://www.tcs.hut.fi/~helger/crypto/

118. Digital Signature Resource Center
A collection of links to digital signature related laws, policy development, ecommerce, and cryptography resources. (Internet Law and Policy Forum)
http://www.ilpf.org/groups/index.htm#authentication

119. International Cryptography Freedom
Links to crypto download and information from around the world.Category Computers Hacking cryptography......INTERNATIONAL cryptography FREEDOM. Last Updated 23 January 1999 Add Spain 2. relatedto cryptography, cryptanalysis, steganography, information hiding, etc.
http://www.dis.org/Crypto/crypto-free.html

120. Laboratory For Theoretical And Quantum Computing, Montreal
Publications, laboratory staff members, and Java applets related to quantum cryptography, quantum information, quantum teleportation, computational complexity, algorithmics, and graph theory.
http://www.iro.umontreal.ca/labs/theorique/index.html.en

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Page 6     101-120 of 175    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20

free hit counter