Geometry.Net - the online learning center
Home  - Science - Cryptography

e99.com Bookstore
  
Images 
Newsgroups
Page 9     161-175 of 175    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9 
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Cryptography:     more books (100)
  1. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition by Bruce Schneier, 1996-10-18
  2. Cryptography Engineering: Design Principles and Practical Applications by Niels Ferguson, Bruce Schneier, et all 2010-03-15
  3. Understanding Cryptography: A Textbook for Students and Practitioners by Christof Paar, Jan Pelzl, 2009-12-10
  4. An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics) by Jeffrey Hoffstein, Jill Pipher, et all 2010-11-02
  5. Cryptography and Network Security: Principles and Practice (5th Edition) by William Stallings, 2010-01-24
  6. Introduction to Modern Cryptography: Principles and Protocols (Chapman & Hall/CRC Cryptography and Network Security Series) by Jonathan Katz, Yehuda Lindell, 2007-08-31
  7. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography by Simon Singh, 2000-08-29
  8. Cryptography Decrypted by H. X. Mel, Doris M. Baker, 2000-12-31
  9. Practical Cryptography by Niels Ferguson, Bruce Schneier, 2003-03-28
  10. Cryptography: A Very Short Introduction (Very Short Introductions) by Fred Piper, Sean Murphy, 2002-07-15
  11. Cryptography: The Science of Secret Writing by Laurence D. Smith, 1955-06-01
  12. Cryptography: Theory and Practice, Third Edition (Discrete Mathematics and Its Applications) by Douglas R. Stinson, 2005-11-01
  13. Introduction to Cryptography with Mathematical Foundations and Computer Implementations (Discrete Mathematics and Its Applications) by Alexander Stanoyevitch, 2010-08-09
  14. Foundations of Cryptography: Volume 1, Basic Tools by Oded Goldreich, 2007-01-18

161. Introduction To Cryptography
Introduction to cryptography HTML format (chapter 1 only) @ PDF format(requires Adobe Acrobat Reader). PGPi Home Documentation
http://www.pgpi.org/doc/guide/6.5/en/intro/

162. Computational Aspects Of Algebraic Curves And Cryptography
Workshop at the University of Florida, March 3 7, 2003.
http://www.math.ufl.edu/~helmut/compalg.html

163. LinuxSecurity - Resources -
Scanners, Access Control, Auditing cryptography, Network, Filesystem, Authentication,Mail, VPNs Crypto, Distributions cryptography, 11/14/2002 924.
http://www.linuxsecurity.com/resources/cryptography-1.html

164. Algebraic Aspects Of Cryptography
Neal Koblitz. A textbook for a course, or selfinstruction, in cryptography with emphasis on algebraic methods.
http://www.springer-ny.com/detail.tpl?isbn=3540634460

165. The Polymorphic Cipher
An article by C. B. Roellgen about large keyspace cryptography.
http://www.ciphers.de/bpp/polymorphic_cipher.html

166. Crypto CD
A comprehensive archive of cryptography programs. Includes a lot of filesystems. (Available on CD or their ftp site)
http://www.cryptocd.org/

167. CryptoSys Tools
CryptoSys is a commercial site which offers cryptography software tools for Visual Basic developers. Included are many symmetric algorithms (Rijndael, DES, 3DES, and Blowfish) together with various oneway hash funcitons (SHA-1 and SHA-256).
http://www.cryptosys.net/

168. Encryption And Privacy In The Digital Age
Provides information on how cryptography can be used in protecting privacy on the Internet.
http://www.mycrypto.net/

169. Counterpane Internet Security, Inc.
Counterpane White Paper. Counterpane Presentation. Giga IdeaByte on ManagedSecurity Monitoring Network Events Processed Since 1/1/2003 (more info).
http://www.counterpane.com/

170. Www.oecd.org/dsti/iccp/crypto_e.html

http://www.oecd.org/dsti/iccp/crypto_e.html

171. Www.oecd.org/dsti/sti/it/secur/prod/e-crypto.htm

http://www.oecd.org/dsti/sti/it/secur/prod/e-crypto.htm

172. Www.kluweronline.com/issn/0925-1022/current

http://www.kluweronline.com/issn/0925-1022/current

173. Joel's Page
Current Activities Search and Rescue Pager Log Deschutes County SAR Mission BlogOregon Disaster Medical Team The Complete, Unofficial TEMPEST page is still
http://www.eskimo.com/~joelm/

174. Encryption And Security Tutorial
Overview. This page contains my godzilla crypto tutorial, totalling704 slides in 8 parts, of which the first 7 are the tutorial
http://www.cs.auckland.ac.nz/~pgut001/tutorial/

175. Untitled
Redirecting to http//www.cccns.uwm.edu If your browser doesn't understandthe redirect, you may want to go to http//www.cccns.uwm.edu directly.
http://www.cs.uwm.edu/~cccns/

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Page 9     161-175 of 175    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9 

free hit counter