Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 691
- Data encryption (Computer science) 689
- Computer science 504
- Data protection 408
- Cryptography 398
- Computer security 363
- Security measures 310
- Computer software 217
- Artificial intelligence 214
- Information storage and retrieval systems 205
- Data structures (Computer science) 203
- Coding theory 202
- Application software 192
- Mathematics 166
- Computational complexity 140
- Computers 117
- Information theory 116
- Engineering 104
- Software engineering 101
- Computational intelligence 98
- Telecommunication 96
- Computer engineering 93
- Number theory 81
- Blockchains (Databases) 76
- Data processing 70
- Internet of things 64
- Algorithms 60
- Algebra 59
- Computer vision 59
- Operating systems (Computers) 59
-
1
Cryptography.
Published 2017Table of Contents: “…11.12 RAPPOR -- 11.13 Secure Function Evaluation (SFE) -- 11.14 Secure Remote Password (SRP) Protocol -- 11.15 Lab/Tutorial -- Reference -- Chapter 12 -- Wireless Cryptography and Stream Ciphers -- 12.1 Introduction -- 12.2 RC4 -- 12.3 WEP -- 12.4 Wi-fi Standards -- 12.5 WPA and WPA-2 -- 12.6 WPA-2 Handshaking -- 12.7 Cracking WPA-2 PSK -- 12.8 Stream Ciphers -- 12.9 A5 Ciphers -- 12.9.1 Practical Systems -- 12.9.2 A5/3 -- 12.10 Lab/Tutorial -- References -- Appendix A -- Index -- About the Author -- Back Cover.…”
Full text (Wentworth users only)
Full text (Wentworth users only)
Electronic eBook -
2
Cryptography : protocols, design, and applications / Kamol Lek and Naruemol Rajapakse, editors.
Published 2012Table of Contents: “…CRYPTOGRAPHY: PROTOCOLS, DESIGN AND APPLICATIONS; CRYPTOGRAPHY: PROTOCOLS, DESIGN AND APPLICATIONS; LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA; CONTENTS; PREFACE; Chapter 1: QUANTUM CRYPTOGRAPHIC PROTOCOLS AND QUANTUM SECURITY; Abstract; 1. …”
Full text (Wentworth users only)
Electronic eBook -
3
Cryptography by Simon Rubinstein-Salzedo.
Published 2018Full text (Wentworth users only)
Electronic eBook -
4
Cryptography Learn Public Key Infrastructure from Scratch / Rana, Himanshu.
Published 2020Streaming video (Wentworth users only)
Electronic Video -
5
-
6
Cryptography : Learn Public Key Infrastructure from Scratch / Rana, Himanshu.
Published 2020Streaming video (Wentworth users only)
Electronic Video -
7
Cryptography : the key to digital security, how it works, and why it matters / Keith Martin.
Published 2020Subjects: Streaming audio (Wentworth users only)
Electronic Audio -
8
Cryptography : algorithms, protocols, and standards for computer security / Zoubir Z Mammeri.
Published 2024Table of Contents: “…Introduction to Computer Security -- Introduction to Cryptography -- Mathematical Basics and Computation Algorithms for Cryptography -- Symmetric Ciphering: Historical Ciphers -- Hash Functions, Message Authentication Codes, and Digital Signature -- Stream Ciphers -- Block Ciphers: Basics, TDEA, and AES -- Block Cipher Modes of Operation for Confidentiality -- Block Cipher Modes of Operation for Authentication and Confidentiality -- Introduction to Security Analysis of Blocks Ciphers -- Introduction to Cryptanalysis Attacks on Symmetric Ciphers -- Public-key Cryptosystems: RSA and Finite Field Cryptography Based Schemes -- Public-key Cryptosystems: Elliptic Curve Cryptography -- Key Management -- Digital Certificate, Public-key Infrastructure, TLS, and Kerberos -- Generation of Pseudorandom and Prime Numbers for Cryptographic -- Applications.…”
Full text (Wentworth users only)
Electronic eBook -
9
Coding and cryptography : synergy for a robust communication / Dr.-Ing. habil. Nataša Živić, Universität Siegen.
Published 2013Subjects: Full text (Wentworth users only)
Electronic eBook -
10
Cryptography 101 From Theory to Practice.
Published 2021Table of Contents: “…Intro -- Cryptography 101: From Theory to Practice -- Contents -- Foreword -- Preface -- References -- Acknowledgments -- Chapter 1 Introduction -- 1.1 CRYPTOLOGY -- 1.2 CRYPTOGRAPHIC SYSTEMS -- 1.2.1 Classes of Cryptographic Systems -- 1.2.2 Secure Cryptographic Systems -- 1.3 HISTORICAL BACKGROUND INFORMATION -- 1.4 OUTLINE OF THE BOOK -- References -- Chapter 2 Cryptographic Systems -- 2.1 UNKEYED CRYPTOSYSTEMS -- 2.1.1 Random Generators -- 2.1.2 Random Functions -- 2.1.3 One-Way Functions -- 2.1.4 Cryptographic Hash Functions -- 2.2 SECRET KEY CRYPTOSYSTEMS -- 2.2.1 Pseudorandom Generators -- 2.2.2 Pseudorandom Functions -- 2.2.3 Symmetric Encryption -- 2.2.4 Message Authentication -- 2.2.5 Authenticated Encryption -- 2.3 PUBLIC KEY CRYPTOSYSTEMS -- 2.3.1 Key Establishment -- 2.3.2 Asymmetric Encryption Systems -- 2.4 FINAL REMARKS -- References -- Part I UNKEYEDC RYPTOSYSTEMS -- Chapter 3 Random Generators -- 3.1 INTRODUCTION -- 3.2 REALIZATIONS AND IMPLEMENTATIONS -- 3.2.1 Hardware-Based Random Generators -- 3.2.2 Software-Based Random Generators -- 3.2.3 Deskewing Techniques -- 3.3 STATISTICAL RANDOMNESS TESTING -- References -- Chapter 4 Random Functions -- 4.1 INTRODUCTION -- 4.2 IMPLEMENTATION -- 4.3 FINAL REMARKS -- Chapter 5 One-Way Functions -- 5.1 INTRODUCTION -- 5.2 CANDIDATE ONE-WAY FUNCTIONS -- 5.2.1 Discrete Exponentiation Function -- 5.2.2 RSA Function -- 5.2.3 Modular Square Function -- 5.3 INTEGER FACTORIZATION ALGORITHMS -- 5.3.1 Special-Purpose Algorithms -- 5.3.2 General-Purpose Algorithms -- 5.3.3 State of the Art -- 5.4 ALGORITHMS FOR COMPUTING DISCRETE LOGARITHMS -- 5.4.1 Generic Algorithms -- 5.4.2 Nongeneric (Special-Purpose) Algorithms -- 5.4.3 State of the Art -- 5.5 ELLIPTIC CURVE CRYPTOGRAPHY -- 5.6 FINAL REMARKS -- References -- Chapter 6 Cryptographic Hash Functions -- 6.1 INTRODUCTION.…”
Full text (Wentworth users only)
Electronic eBook -
11
Quantum cryptography : potentially perfect security.
Published 2002Subjects: Full text (Wentworth users only)
Electronic eBook -
12
Contemporary cryptography / Rolf Oppliger.
Published 2005Table of Contents: “…Contemporary Cryptography; Contents vii; Foreword xv; Preface xix; References xxiii; Acknowledgments; Chapter 1 Introduction 1; Chapter 2 Cryptographic Systems 21; Chapter 3 Discrete Mathematics 47; Chapter 4 Probability Theory 103; Chapter 5 Information Theory 125; Chapter 6 Complexity Theory 141; Chapter 7 One-Way Functions 169; Chapter 8 Cryptographic Hash Functions 195; Chapter 9 Random Bit Generators 219; Chapter 10 Symmetric Encryption Systems 229; Chapter 11 Message Authentication Codes 291; Chapter 12 Pseudorandom Bit Generators 309; Chapter 13 Pseudorandom Functions 321…”
Full text (Wentworth users only)
Electronic eBook -
13
Cryptography Apocalypse : Preparing for the Day When Quantum Computing Breaks Today's Crypto.
Published 2019Table of Contents: “…Quantum Computers 53 -- Components of a Quantum Computer 54 -- Quantum Software 55 -- Quantum Stack 55 -- Quantum National Guidance 56 -- National Policy Guidance 56 -- Money Grants and Investments 56 -- Other Quantum Information Science Besides Computers 57 -- For More Information 58 -- Summary 58 -- 3 How Can Quantum Computing Break Today’s Cryptography? 59 -- Cryptography Basics 59 -- Encryption 59 -- Integrity Hashing 72 -- Cryptographic Uses 73 -- How Quantum Computers Can Break Cryptography 74 -- Cutting Time 74 -- Quantum Algorithms 76 -- What Quantum Can and Can’t Break 79 -- Still Theoretical 82 -- Summary 83 -- 4 When Will the Quantum Crypto Break Happen? …”
Full text (Wentworth users only)
Electronic eBook -
14
Introduction to cryptography / Sahadeo Padhye, Rajeev A. Sahu, Vishal Saraswat.
Published 2018Table of Contents: “…<P></P><P></P><B><P>Preface </P><P></P><P>Overview of Cryptography</P></B><P>Introduction </P><P>Goals of Cryptography<B> </P></B><P>Classification of Cryptosystem</P><P>Practically Useful Cryptosystem</P><P>Cryptanalysis</P><B><P></P><P>Basic Algebra</P></B><P>Group</P><P>Ring</P><P>Field</P><P>Exercise</P><P></P><B><P>Number Theory</P></B><P>Introduction</P><P>Prime Numbers</P><P>Cardinality of Primes</P><P>Extended Euclidean Algorithm</P><P>Primality Testing</P><P>Factorization and Algorithms for it</P><P>Congruences</P><P>Quadratic Congruence</P><P>Exponentiation and Logarithm</P><P>Discrete Logarithm Problem and Algorithms for it</P><P>Exercise</P><P></P><B><P>Probability and Perfect Secrecy</P></B><P>Basic Concept of Probability </P><P>Birthday Paradox</P><P>Perfect Secrecy</P><P>Vernam One Time Pad</P><P>Random Number Generation</P><P>Pseudo-random Number Generator</P><P>Exercise</P><P></P><B><P>Complexity Theory </P></B><P>Running Time and Size of Input </P><P>Big-O Notation </P><P>Types of algorithm</P><P>Complexity Classes</P><P>Exercise</P><P></P><B><P>Classical Cryptosystems</P></B><P>Classification of Classical Cryptosystem</P><P>Block Cipher</P><P>Stream Cipher</P><P>Cryptanalysis of Cryptosystems</P><P>Exercise</P><P></P><P> </P><B><P>Block Ciphers</P></B><P>Introduction</P><P>Modes of Operation</P><P>Padding</P><P>Design Considerations </P><P>Data Encryption Standard </P><P>Advanced Encryption Standard</P><P>Exercise </P><P></P><B><P>Hash Function </P></B><P>Compression and Hash Functions </P><P>Hash function for cryptography </P><P>Random Oracle Model </P><P>Cryptographic Hash Functions</P><P>Exercise</P><B><P>Public Key Cryptosystem</P></B><P>Introduction </P><P>Diffie-Hellman Key Exchange Protocol </P><P>RSA Cryptosystem</P><P>Rabin Cryptosystem</P><P>ElGamal Cryptosystem</P><P>Elliptic Curve Cryptosystem</P><P>Exercises </P><P></P><B><P>Digital Signature</P></B><P>Formal Definitions </P><P>Attack Goals for Digital Signature</P><P>Digital Signature in Practice</P><P>Some Popular Digital Signatures </P><P>Exercises</P><P></P><B><P>Research Directions in Cryptography </P></B><P>Pairing-Based Cryptography</P><P>Zero-knowledge Proof System</P><P>Authenticated Group Key Exchange</P><P>Attribute-Based Cryptography</P><P>Homomorphic Encryption </P><P>Secure Multi-party Computation</P><P>Secret Sharing</P><P>Post-Quantum Cryptography </P><P>Side-Channel Analysis</P><P>References</P><P>Index</P>…”
Full text (Wentworth users only)
Electronic eBook -
15
Cryptography Algorithms : A Guide to Algorithms in Blockchain, Quantum Cryptography, Zero-Knowledge Protocols, and Homomorphic Encryption / Massimo Bertaccini.
Published 2022Table of Contents: “…Table of Contents Deep Diving into Cryptography Introduction to Symmetric Encryption Asymmetric Encryption Introducing Hash Functions and Digital Signatures Introduction to Zero-Knowledge Protocols New Algorithms in Public/Private Key Cryptography Elliptic Curves Quantum Cryptography Crypto Search Engine.…”
Full text (Wentworth users only)
Electronic eBook -
16
Cryptography for developers / Tom St Denis, Simon Johnson.
Published 2007Table of Contents: Full text (Wentworth users only)
Electronic eBook -
17
Contemporary Cryptography.
Published 2011Table of Contents: “…Contemporary Cryptography Second Edition; Contents; Foreword; Preface; Acknowledgments; Chapter 1 Introduction; 1.1 CRYPTOLOGY; 1.2 CRYPTOGRAPHIC SYSTEMS; 1.2.1 Classes of Cryptographic Systems; 1.2.2 Secure Cryptographic Systems; 1.2.3 Real Security of Secure Cryptosystems; 1.3 HISTORICAL BACKGROUND INFORMATION; 1.4 OUTLINE OF THE BOOK; References; Chapter 2 Cryptographic Systems; 2.1 UNKEYED CRYPTOSYSTEMS; 2.1.1 One-Way Functions; 2.1.2 Cryptographic Hash Functions; 2.1.3 Random Bit Generators; 2.2 SECRET KEY CRYPTOSYSTEMS; 2.2.1 Symmetric Encryption Systems.…”
Full text (Wentworth users only)
Electronic eBook -
18
-
19
Cryptography for developers / Tom St Denis, Simon Johnson.
Published 2007Table of Contents: Full text (Wentworth users only)
Electronic eBook -
20