Geometry.Net - the online learning center
Home  - Science - Cryptography

e99.com Bookstore
  
Images 
Newsgroups
Page 3     41-60 of 175    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Cryptography:     more books (100)
  1. Guide to Elliptic Curve Cryptography (Springer Professional Computing) by Darrel Hankerson, Alfred J. Menezes, et all 2010-11-02
  2. Complexity and Cryptography: An Introduction by John Talbot, Dominic Welsh, 2006-02-20
  3. Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona) by Alexei Myasnikov, Vladimir Shpilrain, et all 2008-08-27
  4. Rsa Security's Official Guide to Cryptography by Steve Burnett, 2004-01
  5. Introduction to Cryptography (Undergraduate Texts in Mathematics) by Johannes Buchmann, 2004-07-13
  6. Number Story: From Counting to Cryptography by Peter Michael Higgins, 2008-02-25
  7. Post-Quantum Cryptography
  8. The Physics of Quantum Information: Quantum Cryptography, Quantum Teleportation, Quantum Computation
  9. Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking (The Morgan Kaufmann Series in Software Engineering and Programming) by Peter Wayner, 2008-12-17
  10. Java Cryptography Extensions: Practical Guide for Programmers (The Practical Guides) by Jason Weiss, 2004-03-12
  11. Internet Cryptography by Richard E. Smith, 1997-08-01
  12. A Classical Introduction to Cryptography: Applications for Communications Security by Serge Vaudenay, 2010-11-02
  13. Implementing Elliptic Curve Cryptography by Michael Rosing, 1998-01-01
  14. Protocols for Authentication and Key Establishment (Information Security and Cryptography) by Colin Boyd, Anish Mathuria, 2010-11-02

41. Chilkat Crypt -- Encryption Component With AES, RSA, Blowfish, Twofish, And Digi
Supports up to 256bit AES, 2048-bit RSA public-key cryptography, and digital signature creation and validation. By Chilkat Software, Inc. Component, Commercial
http://www.chilkatsoft.com/ChilkatCrypt.asp
Minimum Requirements
Internet Explorer 4.01
(for Windows 95:
Windows Socket 2

AES and RSA Encryption and Digital Signature Component SEE ALSO: Chilkat Crypt.NET for C#, VB.NET, and ASP.NET Latest Release: v2.4.2
Register for your 30-day Unlock Code
Documentation
PDF Docs Change Log ... License
Chilkat Crypt is an ActiveX component that can be used in your security-sensitive Windows applications and websites (ASP) to secure information and to authenticate and validate data integrity. It supports the latest cryptographic standards and technology including up to 256-bit Advanced Encryption Standard (AES), RSA public-key cryptography, and digital signature creation/validation. Features
  • Royalty free licensing. (All Chilkat components are royalty free) Up to 2048-bit key RSA public-key encryption/decryption Digital signature creation and validation Up to 256-bit AES symmetric (password-based) encryption/decryption Up to 256-bit symmetric encryption/decryption using the Twofish algorithm Up to 256-bit symmetric encryption/decryption using the Blowfish algorithm Smart Cards Full control over what Cryptographic Service Provider is used.

42. Hawaii Vacations - Hawaii Vacation Packages - Hawaii Tourism
information. You can check out some fun links that I have collected though that have nothing to do with cryptography! Category Travel.
http://draco.centerline.com:8080/~fran/crypto/
Site of the day
Research great vacations with TripAdvisor
  • Hawaii Vacations
  • Las Vegas Vacations
  • Las Vegas Hotels
  • Florida Vacations/Disneyland Vacations ...
  • Paris Hotels Read reviews and great unbiased articles about where to go, where to stay and what to do when vacationing in Hawaii and other wonderful vacation spots. Hello all... I'm sorry, but this site no longer hosts PGP and RSA information. You can check out some fun links that I have collected though... that have nothing to do with cryptography!
    Category: Travel
  • TripAdvisor: Best site for Hotel Reviews , and great vacation information
    This site features reviews and tons of articles talking about where to go, where to stay, and what to do when on vacation.
    Category: Fun
  • Sagittal Software Company : Best site for sending handwritten emails
    Pick a handwriting style, and send a friend a personal note...
  • 43. Welcome To CCC Workshop
    Huang Shan City, China; 2328 June 2003.
    http://www.ustc.edu.cn/conference/ccc

    Call For Paper
    Committees Invited Speakers Tour Information ... More Links
    HuangShan (Yellow Mountain) City
    23-28 June, 2003 Organized by University of Science and Technology of China
    Email: ccc2003@ustc.edu.cn

    44. Cryptography
    cryptography. The expansion of do so. One of the techniques for ensuringprivacy of files and communications is cryptography. What
    http://axion.physics.ubc.ca/crypt.html
    Cryptography
    The expansion of the connectivity of computers make ways of protecting data and messages from tampering or reading important. Even the US courts have ruled that there exists no legal expectation of privacy for email. It is thus up to the user to ensure that communications which are expected to remain private actually do so. One of the techniques for ensuring privacy of files and communications is Cryptography. What follows is a list of freely available crypto systems, with comments based on my limited reading in books and on the net. I am not an expert in cryptography, and the following comments are therefor not to be taken as anything but an introductory words on the subject. For another more extensive source for Cryptography available on the net, go to The International Cryptographic Software Pages...
    Index

    45. RSA Laboratories | Public Key Cryptography Standards (PKCS)
    PKCS Standards
    http://www.rsasecurity.com/rsalabs/pkcs/index.html
    RSA Security Home RSA Laboratories PKCS Documents Mailing Lists Questions Workshops ... PKCS #1 v2.1 is now available. Public-Key Cryptography Standards The Public-Key Cryptography Standards are specifications produced by RSA Laboratories in cooperation with secure systems developers worldwide for the purpose of accelerating the deployment of public-key cryptography. First published in 1991 as a result of meetings with a small group of early adopters of public-key technology, the PKCS documents have become widely referenced and implemented. Contributions from the PKCS series have become part of many formal and de facto standards, including ANSI X9 documents, PKIX, SET, S/MIME, and SSL. Further development of PKCS occurs through mailing list discussions and occasional workshops, and suggestions for improvement are welcome. For more information, contact pkcs-editor@rsasecurity.com Contributions for PKCS are welcome! Please read our contribution agreement.

    46. The Cryptography Project
    The cryptography Project. Note This page is no longer being maintained. Go to myhome page for current pages. Denning Articles on cryptography and Wiretapping.
    http://www.cosc.georgetown.edu/~denning/crypto/
    The Cryptography Project
    Note: This page is no longer being maintained. Go to my home page for current pages. The Cryptography Project focuses on encryption policy, but some technology is also covered. This page provides links to papers that I have authored or co-authored and to other selected documents and web pages. See Dorothy E. Denning
    Denning Articles on Cryptography and Wiretapping

    47. OpenSSL: The Open Source Toolkit For SSL/TLS
    A toolkit implementing SSL v2/v3 and TLS protocols with fullstrength cryptography world-wide. It is based on SSLeay, developed by Eric Young and Tim Hudson. Free / Open Source (The OpenSSL Project)
    http://www.openssl.org
    Welcome to the OpenSSL Project
    The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. The project is managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL toolkit and its related documentation. OpenSSL is based on the excellent SSLeay library developed by Eric A. Young and Tim J. Hudson. The OpenSSL toolkit is licensed under an Apache-style licence, which basically means that you are free to get and use it for commercial and non-commercial purposes subject to some simple license conditions. Date Newsflash 19-Mar-2003: Security Advisory : Klima-Pokorny-Rosa attack. 17-Mar-2003: Security Advisory : timing attacks, RSA blinding. 19-feb-2003: OpenSSL 0.9.7a is now available , including important bugfixes 19-feb-2003: OpenSSL 0.9.6i is now

    48. The Future Of Cryptography
    The Future of cryptography. Dorothy E. Denning Georgetown University. A new paradigmof cryptography, key escrow, is emerging and gaining acceptance in industry.
    http://www.cosc.georgetown.edu/~denning/crypto/Future.html
    The Future of Cryptography
    Dorothy E. Denning
    Georgetown University Revised January 6, 1996 A few years ago, the phrase crypto anarchy was coined to suggest the impending arrival of a Brave New World in which governments, as we know them, have crumbled, disappeared, and been replaced by virtual communities of individuals doing as they wish without interference. Proponents argue that crypto anarchy is the inevitable and highly desirable outcome of the release of public key cryptography into the world. With this technology, they say, it will be impossible for governments to control information, compile dossiers, conduct wiretaps, regulate economic arrangements, and even collect taxes. Individuals will be liberated from coercion by their physical neighbors and by governments. This view has been argued recently by Tim May [1]. Behind the anarchists' vision is a belief that a guarantee of absolute privacy and anonymous transactions would make for a civil society based on a libertarian free market. They ally themselves with Jefferson and Hayek who would be horrified at the suggestion that a society with no government control would be either civil or free. Adam Ferguson once said "Liberty or Freedom is not, as the origin of the name may seem to imply, an exemption from all restraints, but rather the most effectual applications of every just restraint to all members of a free society whether they be magistrates or subjects." Hayek opens The Fatal Conceit, The Errors of Socialism

    49. Web Pages Of Interest To Cryptography Researchers
    Web pages of interest to cryptography researchers. Quantum cryptographyat Los Alamos; EISS (Karlsruhe, Germany); UCL Crypto Group; SCSI;
    http://www.swcp.com/~mccurley/cryptographers/cryptographers.html
    Web pages of interest to cryptography researchers
    This page started out as a list of cryptography researchers' home pages, but has been expanded to include links to things that are of interest to people involved in cryptography and security research . No attempt has been made to rank them, and suggestions for additions or corrections are welcome. Send them to the author at mccurley at swcp.com
    Individuals
    Groups and Projects

    50. GILC -- Cryptography And Liberty
    The 1999 update of this report is now available. cryptography AND LIBERTY 1998. LisaKamm created the HTML version of the Report. The Importance of cryptography.
    http://www.gilc.org/crypto/crypto-survey.html
    The 1999 update of this report is now available
    CRYPTOGRAPHY AND LIBERTY 1998
    AN INTERNATIONAL SURVEY OF ENCRYPTION POLICY February 1998

    Global Internet Liberty Campaign
    http://www.gilc.org/ The Importance of Cryptography Encryption and Human Rights GILC and Encryption ... Index by Country
    Acknowledgements
    This Report was made possible by a grant from the Open Society Institute ( http://www.soros.org/osiny.html ). EPIC Senior Fellow Wayne Madsen was the principal researcher and writer. Members of the Global Internet Liberty Campaign provided assistance. Lisa Kamm created the HTML version of the Report.
    The Importance of Cryptography
    Emerging computer and communications technologies are radically altering the ways in which we communicate and exchange information. Along with the speed, efficiency, and cost-saving benefits of the "digital revolution" come new challenges to the security and privacy of communications and information traversing the global communications infrastructure. Governmental regulation of cryptographic security techniques endangers personal privacy. Encryption ensures the confidentiality of personal records, such as medical information, personal financial data, and electronic mail. In a networked environment, such information is increasingly at risk of theft or misuse. In their "Resolution in Support of the Freedom to Use Cryptography," members of the Global Internet Liberty Campaign (GILC) noted that "the use of cryptography implicates human rights and matters of personal liberty that affect individuals around the world" and that "the privacy of communication is explicitly protected by Article 12 of the Universal Declaration of Human Rights, Article 17 of the International Covenant on Civil and Political Rights, and national law." See Resolution in Support of the Freedom to Use Cryptography, September 25, 1996 (Appendix B).

    51. Linux 2.4: Next Generation Kernel Security
    Selective privileges (capabilities), cryptography, random number devices.
    http://www.linuxsecurity.com/feature_stories/kernel-24-security.html
    Hackers Claim NSA Breach
    Mar 21
    The Sendmail Overflow Bug Full Analysis

    Mar 21
    Egress Filtering: Fencing in the Bad Guys

    Mar 21
    Is Your Email Safe From Prying Eyes?

    Mar 21
    Is SSL Safe?

    Mar 21
    Spammers Would Be Made To Pay Under IBM Research Proposal
    Mar 21 IDS Logs in Forensics Investigations: An Analysis of a Compromised Honeypot Mar 21 Today's Term cardholder An entity that has been issued a card. Today's Tip Network and Host Mapping In order to keep yourself secure you must understand your enemy. Features Linux 2.4: Next Generation Kernel Security By Dave Wreski Page [1]: Introduction to Capabilities : Open Source Cryptography and Kernel Devices [Printer Friendly] This document outlines the kernel security improvements that have been made in the 2.4 kernel. A number of significant improvements including cryptography and access control make 2.4 a serious contender for secure corporate environments as well as private virtual networking. One of the most obvious and significant improvements in the 2.4 kernel is the packet filtering capabilities . However, there are a number of other improvements that make Linux one of the most secure operating systems available.

    52. An Introduction To Cryptography
    Richard A. Mollin. Intended for a onesemester introductory undergraduate course in cryptography. Covers symmetric and public key systems with chapters on advanced topics.
    http://www.math.ucalgary.ca/~ramollin/cryptopref.html
    AN INTRODUCTION TO CRYPTOGRAPHY
    ISBN#: 1-58488-127-5
    Reviews
    "This is a great book! It can be used in many ways: for a university course at one extreme, and as selective light reading for pleasure at the other. The author's enthusiasm carries the reader along clearly and easily, spilling over to scores of fascinating, beautifully written footnotes, which include more than fifty mini-biographies." Short Book Reviews, Vol. 21, No. 2, August, 2001 "...this book is excellent and highly recommended." Short Book Reviews, Vol. 21, No. 2, August, 2001
    Order electronically:
    For those who have a copy, here is an online updates page
    TABLE OF CONTENTS:
    BRIEF OVERVIEW:
    Chapter Five on factoring is the first of two optional chapters. Section One involves an illustrated description of three factoring algorithms: Pollard's p-1 method, the Brillhart-Morrison continued fraction algorithm, and the quadratic sieve. A brief history of how the work of Legendre, Euler, Kraitchik and Lehmer led to the development of these algorithms is also provided, as is a discussion of how the notions can be generalized. This motivates the topic of Section Two, which begins with an illustration of how Pollard's original idea for factoring with cubic integers led to the development of the number field sieve. Then a detailed description of the special number field sieve is given (with the factorization of the ninth Fermat number as an illustration) along with a discussion of its complexity in relation to the general number field sieve.

    53. North American Cryptography Archives
    Strong cryptographic software, libraries, and information about cryptography, data security, and privacy.
    http://cryptography.org
    North American Cryptography Archives
    Are you and the computer(s) you are operating both in the United States of America or Canada? Yes No Are you a citizen of the United States of America, a permanent resident (with "green card") of the United States of America, or a citizen of Canada? Yes No Are you aware of the U. S. Export Administration Regulations and similar Canadian regulations? Yes No If you are not eligible for access to strong cryptographic software in the USA, please see our listing of interesting cryptographic sites outside of North America This CryptRing site owned by Michael Paul Johnson
    Prev 5
    Skip Prev Prev ... List This site is maintained by Michael Paul Johnson , who also maintains a neat Bible links site

    54. Java Cryptography Architecture
    Java TM cryptography Architecture. JDK 1.2 significantly extends theJava cryptography Architecture, as described in this document.
    http://java.sun.com/products/jdk/1.2/docs/guide/security/CryptoSpec.html
    Java TM Cryptography Architecture
    Last Modified: 6 Dec 1999
    Introduction
    Design Principles
    Architecture
    Concepts ...
    Appendix B: Algorithms
    Introduction
    The JDK Security API is a core API of the Java programming language, built around the java.security package (and its subpackages). This API is designed to allow developers to incorporate both low-level and high-level security functionality into their programs. The first release of JDK Security in JDK 1.1 introduced the "Java Cryptography Architecture" (JCA), which refers to a framework for accessing and developing cryptographic functionality for the Java platform. In JDK 1.1, the JCA included APIs for digital signatures and message digests. JDK 1.2 significantly extends the Java Cryptography Architecture, as described in this document. It also upgrades the certificate management infrastructure to support X.509 v3 certificates, and introduces a new Java Security Architecture for fine-grain, highly configurable, flexible, and extensible access control. The Java Cryptography Architecture encompasses the parts of the JDK 1.2 Security API related to cryptography, as well as a set of conventions and specifications provided in this document. It includes a

    55. Conference On Coding Theory, Cryptology, And Number Theory
    USNA, Annapolis, MD, USA; 2526 October 1998.
    http://web.usna.navy.mil/~wdj/talk98_30.htm
    USNA Mathematics Department
    Coding theory, Cryptology, and Number Theory Conference
    Time
    October 25 and 26, 1998
    Place USNA Math Dept, Chauvenet Hall, (most talks in C116, Peter Hilton's talk in C216) Coding theory and cryptology/number theory will be on Sunday the 25th, with more cryptology/number theory on Monday the 26th. Prof Hilton will speak Monday night the 26th. This conference is generously funded by the NSA. No registration fee for attending the conference but if you plan to attend, please email David Joyner at wdj@nadn.navy.mil or call at (410)293-6738.
    Main Speakers:
    Professor Peter Hilton
    SUNY, Binghamton and Univ. of Central Florida
    Time : 7-8pm, Monday Oct 26 Title:
    Breaking high grade German ciphers in WWII; working with Alan Turing
    Abstract : During World War II a team of mathematicians, and young would-be mathematicians, worked round the clock to break the highest grade German military and diplomatic codes. They were astonishingly successful, and as a result provided the allied war machine with an unprecedentedly complete picture of the enemy plans and dispositions. I was fortunate to be chosen to be a member of that team. In this talk I describe our work and the atmosphere in which it was conducted. I will further give a description of the special contribution of the famous logician Alan Turing, whom I knew well for the last 10 years of his tragically short life.

    56. Cryptography In OpenBSD
    cryptography. Index Why do we ship cryptography?. OpenSSH. Why do we ship cryptography?In three words because we can. The OpenBSD project is based in Canada.
    http://www.openbsd.org/crypto.html
    "The mantra of any good security engineer is: "Security is not a product, but a process." It's more than designing strong cryptography into a system; it's designing the entire system such that all security measures, including cryptography, work together."
    Bruce Schneier, author of "Applied Cryptography".
    Cryptography
    Index
    Why do we ship cryptography?

    OpenSSH

    Pseudo Random Number Generators
    (PRNG): ARC4, ...
    Cryptographic Hash Functions

    Cryptographic Transforms
    : DES, Blowfish, ...
    Cryptographic Hardware support

    International Cryptographers wanted

    Further Reading
    Why do we ship cryptography?
    In three words: because we can The OpenBSD project is based in Canada. The Export Control List of Canada places no significant restriction on the export of cryptographic software, and is even more explicit about the free export of freely-available cryptographic software. Marc Plumb has done some research to test the cryptographic laws Hence the OpenBSD project has embedded cryptography into numerous places in the operating system. We require that the cryptographic software we use be freely available and with good licenses . We do not directly use cryptography with nasty patents. We also require that such software is from countries with useful export licenses because we do not wish to break the laws of any country. The cryptographic software components which we use currently were written in Argentina, Australia, Canada, Germany, Greece, Norway, and Sweden.

    57. How SSL Works
    The article explains how Secure Sockets Layer (SSL) employs public key cryptography techniques for Internet security. (Netscape)
    http://developer.netscape.com/tech/security/ssl/howitworks.html
    How SSL Works
    AN INTRODUCTION TO KEY CRYPTOGRAPHY RSA Data Security Inc. for use in its products, specifically for authentication. Public key encryption is a technique that uses a pair of asymmetric keys for encryption and decryption. Each pair of keys consists of a public key and a private key. The public key is made public by distributing it widely. The private key is never distributed; it is always kept secret. Data that is encrypted with the public key can be decrypted only with the private key. Conversely, data encrypted with the private key can be decrypted only with the public key. This asymmetry is the property that makes public key cryptography so useful. USING PUBLIC KEY CRYPTOGRAPHY FOR AUTHENTICATION Authentication is the process of verifying identity so that one entity can be sure that another entity is who it claims to be. In the following example involving Alice and Bob, public key cryptography is easily used to verify identity. The notation means that something has been encrypted or decrypted using key Suppose Alice wants to authenticate Bob. Bob has a pair of keys, one public and one private. Bob discloses to Alice his public key (the way he does this is discussed later). Alice then generates a random message and sends it to Bob:

    58. Oreilly.com -- Online Catalog: Java Cryptography
    Teaches you how to write secure programs using Java's cryptographic tools.Category Business Publishing and Printing Technical Books Java......Java cryptography teaches you how to write secure programs using Java'scryptographic tools. It Email This Page. Java cryptography. By
    http://www.oreilly.com/catalog/javacrypt/
    Books Articles Conferences
    O'Reilly Home
    Press Room Jobs Resource Centers Perl Java Python C/C++ ... Bioinformatics Book Series Hacks The Missing Manuals Online Publications MacDevCenter.com ONDotnet.com ONJava.com ONLamp.com ... XML.com Special Interest Events Meerkat News Ask Tim tim.oreilly.com ... Learning Lab Inside O'Reilly About O'Reilly International Media Kit Contact Us ...
    Register your book
    to get email notification of new editions, special offers, and more. Search on Safari Search contents of Java Cryptography Code Fragments only Also see:
    Table of Contents

    Index
    Java Cryptography
    By JonathanĀ Knudsen
    May 1998
    1-56592-402-9, Order Number: 4029
    Buy from O'Reilly: Buy Online at: select a store O'Reilly Amazon.com Amazon.co.uk Amazon.ca Bookpool Borders Chapters.indigo.ca Digital Guru Foyles PC Bookshop (UK) Powell's Quantum Readme.doc Reiter's San Diego Technical Books Softpro Stacey's Java Cryptography teaches you how to write secure programs using Java's cryptographic tools. It includes thorough discussions of the java.security package and the Java Cryptography Extensions (JCE), showing you how to use security providers and even implement your own provider. It discusses authentication, key management, public and private key encryption, and includes a secure talk application that encrypts all data sent over the network. If you work with sensitive data, you'll find this book indispensable. [ Full Description
    Sample Chapter and Code Examples
    Chapter 6: Authentication
    Download the code examples from this book. The complete set of examples is available at:

    59. Information On Cryptography
    There is much overlap between network security and cryptography; seealso my web page with information on computer security. Links
    http://http.cs.berkeley.edu/~daw/crypto.html
    There is much overlap between network security and cryptography; see also my web page with information on computer security
    Links to some cryptography people 's home pages are available.
    Warning : I no longer update this link farm.
    A quick skip index:
    Link farms

    60. Quantum Cryptography In Norway
    Applicationoriented research at NTNU, Trondheim and Telenor, Oslo
    http://www.fysel.ntnu.no/Optics/qcr/
    Quantum Cryptography in Norway
    a research project
  • Our research has been mentioned in article " Bomb-Proof Code " in Norwegian journal Teknisk Ukeblad.
  • Presentation from the Norwegian Cryptographic Seminar is available for download
    Our publications
  • A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 3     41-60 of 175    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20

    free hit counter