Showing 1 - 20 results of 2,435 for search '"cryptography"', query time: 0.16s Refine Results
  1. 1

    Cryptography. by Buchanan, William

    Published 2017
    Table of Contents: “…11.12 RAPPOR -- 11.13 Secure Function Evaluation (SFE) -- 11.14 Secure Remote Password (SRP) Protocol -- 11.15 Lab/Tutorial -- Reference -- Chapter 12 -- Wireless Cryptography and Stream Ciphers -- 12.1 Introduction -- 12.2 RC4 -- 12.3 WEP -- 12.4 Wi-fi Standards -- 12.5 WPA and WPA-2 -- 12.6 WPA-2 Handshaking -- 12.7 Cracking WPA-2 PSK -- 12.8 Stream Ciphers -- 12.9 A5 Ciphers -- 12.9.1 Practical Systems -- 12.9.2 A5/3 -- 12.10 Lab/Tutorial -- References -- Appendix A -- Index -- About the Author -- Back Cover.…”
    Full text (Wentworth users only)
    Full text (Wentworth users only)
    Electronic eBook
  2. 2

    Cryptography : protocols, design, and applications / Kamol Lek and Naruemol Rajapakse, editors.

    Published 2012
    Table of Contents: “…CRYPTOGRAPHY: PROTOCOLS, DESIGN AND APPLICATIONS; CRYPTOGRAPHY: PROTOCOLS, DESIGN AND APPLICATIONS; LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA; CONTENTS; PREFACE; Chapter 1: QUANTUM CRYPTOGRAPHIC PROTOCOLS AND QUANTUM SECURITY; Abstract; 1. …”
    Full text (Wentworth users only)
    Electronic eBook
  3. 3

    Cryptography by Simon Rubinstein-Salzedo. by Rubinstein-Salzedo, Simon

    Published 2018
    Full text (Wentworth users only)
    Electronic eBook
  4. 4
  5. 5

    Cryptography Martin, Keith. by Martin, Keith

    Published 2020
    Streaming audio (Wentworth users only)
    Electronic Audio
  6. 6
  7. 7
  8. 8

    Cryptography : algorithms, protocols, and standards for computer security / Zoubir Z Mammeri. by Mammeri, Zoubir

    Published 2024
    Table of Contents: “…Introduction to Computer Security -- Introduction to Cryptography -- Mathematical Basics and Computation Algorithms for Cryptography -- Symmetric Ciphering: Historical Ciphers -- Hash Functions, Message Authentication Codes, and Digital Signature -- Stream Ciphers -- Block Ciphers: Basics, TDEA, and AES -- Block Cipher Modes of Operation for Confidentiality -- Block Cipher Modes of Operation for Authentication and Confidentiality -- Introduction to Security Analysis of Blocks Ciphers -- Introduction to Cryptanalysis Attacks on Symmetric Ciphers -- Public-key Cryptosystems: RSA and Finite Field Cryptography Based Schemes -- Public-key Cryptosystems: Elliptic Curve Cryptography -- Key Management -- Digital Certificate, Public-key Infrastructure, TLS, and Kerberos -- Generation of Pseudorandom and Prime Numbers for Cryptographic -- Applications.…”
    Full text (Wentworth users only)
    Electronic eBook
  9. 9
  10. 10

    Cryptography 101 From Theory to Practice. by Oppliger, Rolf

    Published 2021
    Table of Contents: “…Intro -- Cryptography 101: From Theory to Practice -- Contents -- Foreword -- Preface -- References -- Acknowledgments -- Chapter 1 Introduction -- 1.1 CRYPTOLOGY -- 1.2 CRYPTOGRAPHIC SYSTEMS -- 1.2.1 Classes of Cryptographic Systems -- 1.2.2 Secure Cryptographic Systems -- 1.3 HISTORICAL BACKGROUND INFORMATION -- 1.4 OUTLINE OF THE BOOK -- References -- Chapter 2 Cryptographic Systems -- 2.1 UNKEYED CRYPTOSYSTEMS -- 2.1.1 Random Generators -- 2.1.2 Random Functions -- 2.1.3 One-Way Functions -- 2.1.4 Cryptographic Hash Functions -- 2.2 SECRET KEY CRYPTOSYSTEMS -- 2.2.1 Pseudorandom Generators -- 2.2.2 Pseudorandom Functions -- 2.2.3 Symmetric Encryption -- 2.2.4 Message Authentication -- 2.2.5 Authenticated Encryption -- 2.3 PUBLIC KEY CRYPTOSYSTEMS -- 2.3.1 Key Establishment -- 2.3.2 Asymmetric Encryption Systems -- 2.4 FINAL REMARKS -- References -- Part I UNKEYEDC RYPTOSYSTEMS -- Chapter 3 Random Generators -- 3.1 INTRODUCTION -- 3.2 REALIZATIONS AND IMPLEMENTATIONS -- 3.2.1 Hardware-Based Random Generators -- 3.2.2 Software-Based Random Generators -- 3.2.3 Deskewing Techniques -- 3.3 STATISTICAL RANDOMNESS TESTING -- References -- Chapter 4 Random Functions -- 4.1 INTRODUCTION -- 4.2 IMPLEMENTATION -- 4.3 FINAL REMARKS -- Chapter 5 One-Way Functions -- 5.1 INTRODUCTION -- 5.2 CANDIDATE ONE-WAY FUNCTIONS -- 5.2.1 Discrete Exponentiation Function -- 5.2.2 RSA Function -- 5.2.3 Modular Square Function -- 5.3 INTEGER FACTORIZATION ALGORITHMS -- 5.3.1 Special-Purpose Algorithms -- 5.3.2 General-Purpose Algorithms -- 5.3.3 State of the Art -- 5.4 ALGORITHMS FOR COMPUTING DISCRETE LOGARITHMS -- 5.4.1 Generic Algorithms -- 5.4.2 Nongeneric (Special-Purpose) Algorithms -- 5.4.3 State of the Art -- 5.5 ELLIPTIC CURVE CRYPTOGRAPHY -- 5.6 FINAL REMARKS -- References -- Chapter 6 Cryptographic Hash Functions -- 6.1 INTRODUCTION.…”
    Full text (Wentworth users only)
    Electronic eBook
  11. 11

    Quantum cryptography : potentially perfect security.

    Published 2002
    Subjects: Full text (Wentworth users only)
    Electronic eBook
  12. 12

    Contemporary cryptography / Rolf Oppliger. by Oppliger, Rolf

    Published 2005
    Table of Contents: “…Contemporary Cryptography; Contents vii; Foreword xv; Preface xix; References xxiii; Acknowledgments; Chapter 1 Introduction 1; Chapter 2 Cryptographic Systems 21; Chapter 3 Discrete Mathematics 47; Chapter 4 Probability Theory 103; Chapter 5 Information Theory 125; Chapter 6 Complexity Theory 141; Chapter 7 One-Way Functions 169; Chapter 8 Cryptographic Hash Functions 195; Chapter 9 Random Bit Generators 219; Chapter 10 Symmetric Encryption Systems 229; Chapter 11 Message Authentication Codes 291; Chapter 12 Pseudorandom Bit Generators 309; Chapter 13 Pseudorandom Functions 321…”
    Full text (Wentworth users only)
    Electronic eBook
  13. 13

    Cryptography Apocalypse : Preparing for the Day When Quantum Computing Breaks Today's Crypto. by Grimes, Roger A.

    Published 2019
    Table of Contents: “…Quantum Computers 53 -- Components of a Quantum Computer 54 -- Quantum Software 55 -- Quantum Stack 55 -- Quantum National Guidance 56 -- National Policy Guidance 56 -- Money Grants and Investments 56 -- Other Quantum Information Science Besides Computers 57 -- For More Information 58 -- Summary 58 -- 3 How Can Quantum Computing Break Today’s Cryptography? 59 -- Cryptography Basics 59 -- Encryption 59 -- Integrity Hashing 72 -- Cryptographic Uses 73 -- How Quantum Computers Can Break Cryptography 74 -- Cutting Time 74 -- Quantum Algorithms 76 -- What Quantum Can and Can’t Break 79 -- Still Theoretical 82 -- Summary 83 -- 4 When Will the Quantum Crypto Break Happen? …”
    Full text (Wentworth users only)
    Electronic eBook
  14. 14

    Introduction to cryptography / Sahadeo Padhye, Rajeev A. Sahu, Vishal Saraswat. by Padhye, Sahadeo, Sahu, Rajeev A., Saraswat, Vishal

    Published 2018
    Table of Contents: “…<P></P><P></P><B><P>Preface </P><P></P><P>Overview of Cryptography</P></B><P>Introduction </P><P>Goals of Cryptography<B> </P></B><P>Classification of Cryptosystem</P><P>Practically Useful Cryptosystem</P><P>Cryptanalysis</P><B><P></P><P>Basic Algebra</P></B><P>Group</P><P>Ring</P><P>Field</P><P>Exercise</P><P></P><B><P>Number Theory</P></B><P>Introduction</P><P>Prime Numbers</P><P>Cardinality of Primes</P><P>Extended Euclidean Algorithm</P><P>Primality Testing</P><P>Factorization and Algorithms for it</P><P>Congruences</P><P>Quadratic Congruence</P><P>Exponentiation and Logarithm</P><P>Discrete Logarithm Problem and Algorithms for it</P><P>Exercise</P><P></P><B><P>Probability and Perfect Secrecy</P></B><P>Basic Concept of Probability </P><P>Birthday Paradox</P><P>Perfect Secrecy</P><P>Vernam One Time Pad</P><P>Random Number Generation</P><P>Pseudo-random Number Generator</P><P>Exercise</P><P></P><B><P>Complexity Theory </P></B><P>Running Time and Size of Input </P><P>Big-O Notation </P><P>Types of algorithm</P><P>Complexity Classes</P><P>Exercise</P><P></P><B><P>Classical Cryptosystems</P></B><P>Classification of Classical Cryptosystem</P><P>Block Cipher</P><P>Stream Cipher</P><P>Cryptanalysis of Cryptosystems</P><P>Exercise</P><P></P><P> </P><B><P>Block Ciphers</P></B><P>Introduction</P><P>Modes of Operation</P><P>Padding</P><P>Design Considerations </P><P>Data Encryption Standard </P><P>Advanced Encryption Standard</P><P>Exercise </P><P></P><B><P>Hash Function </P></B><P>Compression and Hash Functions </P><P>Hash function for cryptography </P><P>Random Oracle Model </P><P>Cryptographic Hash Functions</P><P>Exercise</P><B><P>Public Key Cryptosystem</P></B><P>Introduction </P><P>Diffie-Hellman Key Exchange Protocol </P><P>RSA Cryptosystem</P><P>Rabin Cryptosystem</P><P>ElGamal Cryptosystem</P><P>Elliptic Curve Cryptosystem</P><P>Exercises </P><P></P><B><P>Digital Signature</P></B><P>Formal Definitions </P><P>Attack Goals for Digital Signature</P><P>Digital Signature in Practice</P><P>Some Popular Digital Signatures </P><P>Exercises</P><P></P><B><P>Research Directions in Cryptography </P></B><P>Pairing-Based Cryptography</P><P>Zero-knowledge Proof System</P><P>Authenticated Group Key Exchange</P><P>Attribute-Based Cryptography</P><P>Homomorphic Encryption </P><P>Secure Multi-party Computation</P><P>Secret Sharing</P><P>Post-Quantum Cryptography </P><P>Side-Channel Analysis</P><P>References</P><P>Index</P>…”
    Full text (Wentworth users only)
    Electronic eBook
  15. 15

    Cryptography Algorithms : A Guide to Algorithms in Blockchain, Quantum Cryptography, Zero-Knowledge Protocols, and Homomorphic Encryption / Massimo Bertaccini. by Bertaccini, Massimo

    Published 2022
    Table of Contents: “…Table of Contents Deep Diving into Cryptography Introduction to Symmetric Encryption Asymmetric Encryption Introducing Hash Functions and Digital Signatures Introduction to Zero-Knowledge Protocols New Algorithms in Public/Private Key Cryptography Elliptic Curves Quantum Cryptography Crypto Search Engine.…”
    Full text (Wentworth users only)
    Electronic eBook
  16. 16

    Cryptography for developers / Tom St Denis, Simon Johnson. by St. Denis, Tom

    Published 2007
    Table of Contents:
    Full text (Wentworth users only)
    Electronic eBook
  17. 17

    Contemporary Cryptography. by Oppliger, Rolf

    Published 2011
    Table of Contents: “…Contemporary Cryptography Second Edition; Contents; Foreword; Preface; Acknowledgments; Chapter 1 Introduction; 1.1 CRYPTOLOGY; 1.2 CRYPTOGRAPHIC SYSTEMS; 1.2.1 Classes of Cryptographic Systems; 1.2.2 Secure Cryptographic Systems; 1.2.3 Real Security of Secure Cryptosystems; 1.3 HISTORICAL BACKGROUND INFORMATION; 1.4 OUTLINE OF THE BOOK; References; Chapter 2 Cryptographic Systems; 2.1 UNKEYED CRYPTOSYSTEMS; 2.1.1 One-Way Functions; 2.1.2 Cryptographic Hash Functions; 2.1.3 Random Bit Generators; 2.2 SECRET KEY CRYPTOSYSTEMS; 2.2.1 Symmetric Encryption Systems.…”
    Full text (Wentworth users only)
    Electronic eBook
  18. 18
  19. 19

    Cryptography for developers / Tom St Denis, Simon Johnson. by St. Denis, Tom

    Published 2007
    Table of Contents:
    Full text (Wentworth users only)
    Electronic eBook
  20. 20