Geometry.Net - the online learning center
Home  - Science - Cryptography

e99.com Bookstore
  
Images 
Newsgroups
Page 5     81-100 of 175    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Cryptography:     more books (100)
  1. Cryptography in the Database: The Last Line of Defense by Kevin Kenan, 2005-10-29
  2. Cryptography and E-Commerce: A Wiley Tech Brief by Jon C. Graff, 2000-12-11
  3. Implementing SSL/TLS Using Cryptography and PKI by Joshua Davies, 2011-02-08
  4. Handbook of Financial Cryptography and Security (Chapman & Hall/CRC Cryptography and Network Security Series)
  5. Access Control, Security, and Trust: A Logical Approach (Chapman & Hall/CRC Cryptography and Network Security Series) by Shiu-Kai Chin, Susan Beth Older, 2010-07-26
  6. Codes: An Introduction to Information Communication and Cryptography (Springer Undergraduate Mathematics Series) by Norman L. Biggs, 2008-08-08
  7. Theoretical Computer Science: Introduction to Automata, Computability, Complexity, Algorithmics, Randomization, Communication, and Cryptography (Texts in Theoretical Computer Science. An EATCS Series) by Juraj Hromkovic, 2010-11-02
  8. Cryptography: An Introduction by Nigel Smart, 2004-12-30
  9. Algorithmic Number Theory: Lattices, Number Fields, Curves and Cryptography (Mathematical Sciences Research Institute Publications)
  10. Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series) (v. 2)
  11. Practical Signcryption (Information Security and Cryptography)
  12. Public Key Cryptography - PKC 2005: 8th International Workshop on Theory and Practice in Public Key Cryptography (Lecture Notes in Computer Science / Security and Cryptology)
  13. Algebraic Aspects of Cryptography (Algorithms and Computation in Mathematics) by Neal Koblitz, 2010-11-30
  14. Cryptography: An Introduction to Computer Security (Advances in Computer Science Series) by Jennifer Seberry, Josef Pieprzyk, 1989-09

81. Efg's Reference Library: Delphi Cryptography And Multiple-Precision Arithmetic
Comprehensive compilation of cryptography and highprecision math resources for Delphi (mirrored on Borland's website). Computer lab also features dozens of practical mathematics and graphics projects. Delphi source code with quality annotations.
http://www.efg2.com/Lab/Library/Delphi/MathFunctions/Cryptography.htm
Delphi Math Functions Cryptography and Multiple-Precision Arithmetic Contents Cryptography Multiple-Precision Arithmetic Also see Cryptography section of efg's Mathematics Page Cryptography
Federation of American Scientists: Cryptology Links

Everything to hide: Knowing the right cryptographic algorithm

Dr. Dobb's Security Page
Category Source(s) Anti-Cracking FAQ from Richey's Delphi-Box
http://www.inner-smile.com/nocrack.htm
Easy to use, fast and flexible components implementing most popular algorithms to encrypt/decrypt data and calculate digests. Package includes random and prime numbers generators up to 4096 bit. All cryptography components can generate keys, load and save them to file. All but RSA support ECB. CBC, CFB and OFB modes, ciphering in-place or into internal buffers.
http://delphi.icm.edu.pl/ftp/d50share/ASCryptoKit5.zip
Block Ciphers A block cipher class hierarchy. Currently includes TDESCipher and TBlowfishCipher, with more to come soon. The ciphers all form a hierarchy, descending from TBlockCipher, allowing for polymorphic instantiation of any cipher you choose. The DES implementation has been heavily optimized with a lot of help from Bob Lee. It encrypts 4.2 megs/sec on my Pentium II. Blowfish has been similarly optimized, encrypting 6.5 megs/sec.
www.csd.net/~daves/delphi/BlockCiphers.zip

82. Cryptography - Home
The Microsoft Research cryptography Group studies and developsmethods to enhance user and system privacy and security.
http://research.microsoft.com/crypto/
// Globalized strings for the java script in the search box part. var L_strInternalPropErr_TEXT = "Internal error with property fields. Please try another query."; var L_strContainsNumericErr_TEXT = "Cannot use the Contains operator for numeric properties."; var L_strDigitsNumericErr_TEXT = "Must use digits 0-9 for numeric properties."; var L_strContainsDateErr_TEXT = "Cannot use the Contains operator for date-type properties."; var L_strSearchForSomethingErr_TEXT = "You must specify something to search for."; Search MSR Advanced Search
Research Projects Topics People Publications News MSR News Press Kit Press Resources Feature Stories Collaboration Community Conferences Lectures Online University Relations About MSR Jobs Visiting MSR Labs Contact Us ... Home Cryptography
Overview Group Member Photos People Projects Selected Publications Overview Cryptography – from the Greek: hidden writing - is the ancient science of encoding messages so that only the sender and receiver can understand them. Cryptography is now available to everyone thanks to the development of modern computers, which can perform more mathematical operations in a second than a human being could do in a lifetime. An ordinary PC can produce codes of such complexity that the most powerful supercomputer using the best available attack algorithms would not break them in a million years. Cryptography is used to secure telephone, Internet, and email communication and to protect software and other digital property. It may soon usher in a new age of money with electronic commerce. The Cryptography and Anti-Piracy group within Microsoft Research serves multiple roles:

83. Products And Technologies
List of certificate authorities issuing ServerGated cryptography certificates. (Microsoft)
http://www.microsoft.com/security/tech/sgc/CAs.asp
var sContentID = "28001414"; TechNet Home Security
Security Products and Technologies
Get up-to-speed on the products and technologies you can deploy to implement and maintain security on your server or in your network. This section includes resources on certificates and certificate services, cryptography, Kerberos, PKI, and various other topics. Quick Resource Guides To Securing Client and Server Systems Security Resource Sections
Let Microsoft Training Help You Create a Secure Connected Infrastructure
Discover how Microsoft security training can help you build the skills you need to secure your network at every level. (February 10) More...
Learn to Design Secure Networks with Microsoft Frameworks
This three-day course teaches you to design and implement a security design framework, identifying threats and analyzing risks by using the Microsoft Solutions Framework (MSF). It also covers designing a secure solution that encompasses physical resources, computers, accounts, authentication, data, and communication. (February 10) More...

84. Bibliography Of Quantum Cryptography
A Bibliography of Quantum cryptography. by Gilles Brassard. Recent paperson Quantum cryptography. JMO Special Issue Quantum Communication.
http://www.cs.mcgill.ca/~crepeau/CRYPTO/Biblio-QC.html
A Bibliography of Quantum Cryptography
by Gilles Brassard Département IRO, Université de Montréal.
C.P. 6128, Succursale "Centre-Ville"
Montréal (Québec) Canada H3C 3J7
The original PostScript file from Gilles Brassard - provided by Edith Stoeveken -
was converted to ASCII and reformatted in HTML; Sept 2 1994, Stephan Kaufmann.
HTTP pointers to DVI files added by Claude Crépeau, March 6 1995.
Multiple file format added July 21st 1996 by Claude.
FORMATS: D = DVI, P = POSTSCRIPT, G = POSTSCRIPT+GZIP
Abstract
This paper provides an extensive annotated bibliography of papers that have been written on quantum cryptography and related topics.
1. Introduction
In the past few years, a remarkable surge of interest in the international scientific and industrial community has propelled quantum cryptography into mainstream computer science and physics. Furthermore, quantum cryptography is becoming increasingly practical at a fast pace. The first quantum key distribution prototype [2] worked over a distance of 32 centimetres in 1989. Two additional experimental demonstrations have been set up since, which work over significant lengths of optical fibre [13, 14]. The purpose of this work is to provide an extensive bibliography of most papers ever written on quantum cryptography, including some unpublished papers. In addition, a limited selection of key papers that describe techniques of crucial importance to quantum cryptography, such as privacy amplification [63, 73], is included. The papers are listed in chronological order within each section.

85. WCC 99
Paris, 1114 January 1999
http://www-rocq.inria.fr/codes/WCC99/
WCC 99 Workshop on Coding and Cryptography January 11-14, 1999, PARIS (France)
The workshop will be held in the "Cercle Militaire" - a high standard hotel located in Paris, at walking distance from the Avenue des Champs Élysées. It is hosted by INRIA and the "Centre de Recherche des Écoles de Coëtquidan"
Sponsors
Service Central de la Sécurité des Systèmes d'Information Délégation Générale pour l'Armement Thomson-CSF
The official languages are English an French.

UP-TO-DATE INFORMATION
PRELIMINARY PROGRAM
REGISTRATION FORM
Postscript ( English or French version) LaTeX2e source ( English or French version)

HOTELS INFORMATION
LIST OF ACCEPTED PAPERS
You can see there the Call for papers in an html version; you can get the ascii and the postscript ( english french If you need to contact us, see the Contact Information
How to come to the workshop ?
Accomodation and Meals You can find here some information on Paris, with interesting links for your leisure. You can look at the web site of Météo France to know the weather forecast. Some general information about the registration
Back to the Home Page of the CODES' project.

86. Lecture Notes On Cryptography
Lecture Notes on cryptography. Authors S. Goldwasser and M. BellareAbstract This is a set of lecture notes for a summer course
http://www.cs.ucsd.edu/users/mihir/papers/gb.html
Lecture Notes on Cryptography
Authors: S. Goldwasser and M. Bellare Abstract: This is a set of lecture notes for a summer course on cryptography, taught by the authors at the Massachusetts Institute of Technology (MIT), 19962001. Complete document: About 290 pages. Available as compressed postscript postscript , or pdf Help if this doesn't work).

87. Arimta Technology
cryptography component with focus on interoperability. Supports MD5 hashing and AES (Rijndael) encryption / decryption with custom IV, CBC mode, and PKCS7 padding. Processes data in Hex, Base64, Unicode string, or binary formats. By Arimta Technology. Component, Commercial
http://www.arimta.com/?go=Crypto

88. Encryption - RSA Security Components, Data, E-Business Technologies And SDK
Toolkits for SSL, general cryptography, and PKI. Commercial
http://www.rsasecurity.com/products/bsafe/
RSA Security Home Products Industry Financial Government Healthcare Pharmaceutical Solutions Wireless Security Products RSA BSAFE RSA e-Sign RSA Keon Certificate Authority In-depth White Papers Customer Success Stories Developer Solutions
Bottom Line
RSA Security Developer Solutions are one of the most widely used e-security software components in the world. More than 1,000 organizations have used RSA Security software development kits (SDKs) to help lower their cost of development, shorten their time to market with new products and increase revenue by accessing new market opportunities. Our RSA BSAFE and RSA e-Sign SDKs are designed to provide high-performance security based on more than a decade of extensive engineering and cutting-edge cryptographic advancements. Document Finder:
To make it easier to find what you're looking for we've collected all of the RSA BSAFE/Developer Solutions documents in one place. Choose a document type:
Please choose one Brochures Data Sheets Case Studies White Papers Miscellaneous
Choose a specific document:
Please choose from above RSA Secured Partners
click here
Professional Services
Download an evaluation copy of RSA BSAFE software RSA Labs Security Standards (XML, SAML, SSL, PKCS, etc.)

89. CRYPTOGRAPHY AND LIBERTY
Order the published copy of cryptography and Liberty 1999. cryptography andLiberty 1999. An International Survey of. The Importance of cryptography.
http://www2.epic.org/reports/crypto1999.html
Order the published copy of Cryptography and Liberty 1999
Cryptography and Liberty 1999 An International Survey of Encryption Policy Electronic Privacy Information Center Washington, DC Table of Contents Executive Summary The Importance of Cryptography Encryption and Human Rights GILC and Encryption Purpose and Methodology of the Survey Country Ratings Survey Results Few Domestic Controls Little Support for Key Escrow/Key Recovery Increase in Surveillance Budgets and Powers The Role of Export Controls The Wassenaar Arrangement The Unclear Authority of Wassenaar The New Wassenaar List of Dual-Use Goods and Technologies The International Development of Encryption Policy Organization for Economic Cooperation and Development The European Union G-8 Council of Europe Country Reports Angola Anguilla Antigua and Barbuda Argentina Armenia Aruba Australia Austria Bahrain Belarus Belgium Belize Brazil Bulgaria Cambodia Canada Chile China Croatia Cyprus Czech Republic Denmark Dominica Estonia Falkland Islands Finland France Germany Gibraltar Greece Hong Kong Hungary Iceland India Indonesia Iran Ireland Israel Italy Japan Kazakhstan Kenya Korea, Republic of (South Korea)

90. ID Quantique
Site Of id Quantique, Inc. Products include a quantum random number generator,and a quantum cryptography system.
http://www.idquantique.com

Home
Company Products
Quantum Random Number Generator

Quantum Key Distribution

Single Photon Detection Module

Contact
NEWS LONG-DISTANCE QUANTUM TELEPORTATION...
...using idQ's Single Photon Detection Module (SPDM) . Read more about the recent experiment at the University of Geneva
Read the
NATURE paper... QKD WILL CHANGE THE WORLD
MIT's Technology Review identifies the developments that will dramatically affect the way we live and work - and profiles idQ's co-founder Nicolas Gisin
Read the article in
Technology Review NATURE REPORTS ON QKD AND id QUANTIQUE
"Quantum cryptography: Can you keep a secret?" In its issue of July 18, Nature reports on the first steps towards commercializing Quantum Key Distribution systems. Read the report...

91. Cryptography And Liberty 2000
cryptography and Liberty 2000 An International Survey of Encryption Policy.TABLE OF CONTENTS. Executive Summary. Purpose and Methodology
http://www2.epic.org/reports/crypto2000/
Cryptography and Liberty 2000
An International Survey of Encryption Policy TABLE OF CONTENTS Executive Summary Purpose and Methodology of the Survey
Country Ratings
Issues in Encryption Policy ...
Council of Europe

COUNTRY REPORTS
Andorra
Angola

Anguilla

Antigua and Barbuda
...
Yemen

92. DCCG Workshop, Lethbridge, July 2001
Second Lethbridge Workshop on Designs, Codes, cryptography and Graph Theory a combination of instructional lectures and research sessions. Lethbridge, Alberta; July 914, 2001.
http://www.cs.uleth.ca/dccg/
Your browser is not frames capable. See no-frame version of this page.

93. Cryptography.Ru
The summary for this Russian page contains characters that cannot be correctly displayed in this language/character set.
http://www.cryptography.ru/
WIN KOI MAC TRANSLIT ...
  • úÁÏÞÎÙÊ ËÏÎËÕÒÓ ÐÏ ÍÁÔÅÍÁÔÉËÅ É ËÒÉÐÔÏÇÒÁÆÉÉ ÎÁ www.cryptography.ru (×ÅÓÅÎÎÉÊ ÔÕÒ 2003 ÇÏÄÁ)
    ðÒÏÅËÔ "Cryptography.Ru"
  • 94. Glossary For Internet Cryptography
    Glossary of cryptographic and computer terminology from the book Internet cryptography .
    http://www.smat.us/crypto/inet-crypto/glossary.html
    Basic Glossary from Internet Cryptography
    by Richard E. Smith
    ISBN 0-201-92480-3, Addison Wesley, 1997
    Internet Cryptography Home Page
    Index: A B C D ... X A
    active attack
    An attack in which the attacker must create or modify information.
    Advanced Research Projects Agency (ARPA)
    Agency of the U. S. Department of Defense that promotes exploratory research in areas that carry long term promise for military applications. ARPA funded the major packet switching experiments in the United States that led to the Internet, particularly the ARPANET
    algorithm
    Procedure; a crypto algorithm defines a particular procedure for encrypting or decrypting data. Specific algorithms include DES IDEA SKIPJACK
    American National Standards Institute (ANSI)
    Organization that endorses and publishes standards for various industries.
    annual solar limit
    Refers to the total amount of energy produced by the sun in a year. It is possible to calculate a worst case upper limit for the number of keys that can be tested with that amount of energy: 2^192 keys. This suggests that a secret key containing 192 bits is impractical to crack using brute force methods.

    95. Quantum Cryptography In Norway
    Experimental research in quantum cryptography at NTNU and Telenor projecthomepage. Monument Integration and Moon, Quantum cryptography in Norway.
    http://www.vad1.com/qcr/
    Quantum Cryptography in Norway
    a research project
  • Our research has been mentioned in article " Bomb-Proof Code " in Norwegian journal Teknisk Ukeblad.
  • Presentation from the Norwegian Cryptographic Seminar is available for download
    Our publications
  • 96. A Short History Of Cryptography
    A brief historical analysis of the management of cryptography.
    http://www.all.net/books/ip/Chap2-1.html
    2.1 - A Short History of Cryptography
    Cryptography is one of the oldest fields of technical study we can find records of, going back at least 4,000 years. It is quite noteworthy that of all the cryptosystems developed in those 4,000 years of effort, only 3 systems in widespread serious use remain hard enough to break to be of real value. One of them takes too much space for most practical uses, another is too slow for most practical uses, and the third is widely believed to contain serious weaknesses. We begin with a classification scheme for ciphers given by Gary Knight in the first of a series of articles which posed ciphers to the reader, and after a given period of time demonstrated reader solutions along with explanations of how they solved the ciphers. Versions of the solutions attained by the author were also given along with many mathematical techniques for "attacking the unknown cipher". Substitution Polyalphabetic Periodic Non-Interrelated Alphabets Interrelated Alphabets Pseudorandom Key Non-periodic Non-Random Key, Random Key Polygraphic Digraphic, Algebraic Monoalphabetic Standard, Mixed Alphabet, Homomorphic, Incomplete Mixed Alphabet, Multiplex, Double Fractionating Bifid, Trifid, Fractionated Morse, Morbit Transposition Geometrical - Rail-fence, Route, Grille Columnar Complete - Cadenus, Nihilist Incomplete - Myskowski, Amsco Double - U.S. Army Transposition Cipher A Classification Scheme for Ciphers

    97. Shortcut To Cryptography
    shor tcut. Ray Kopsa's Shortcut to cryptography. Events.. 98RSADataSecurity(Jan1316) Books..Amazon Applied cryptography(Schneier) Codebreakers(Kahn)
    http://www.subject.com/crypto/crypto.html
    www sub j ect. ... movies sho r tcut Ray Kopsa's Shortcut to Cryptography Events.. CerticomPKS'98 EUROCRYPT'98(May31-Jun4) Crypto'98(Aug23-27) ASIACRYPT'98(Oct18-22) ... IntlAssocCryptoResearch(IACR) Collections.. Counterpane CRYPTO•LOG Cypherpunks Quadralay ... Yahoo Intro's.. ClassicCiphers CryptoBytes Meyer:Introduction Notes ... SymmetricKeyBasics(NavalPostGrad) Concepts.. BlindSignatures(Chaum) Cryptovirology DigitalSignatures/SmartCards(DigiCash) KeyEscrow(Denning)... ... ZeroKnowledge(Aronsson)... CryptoMath.. Number Theory: CerticomAlgebra HistoryOfPrimes ofInterestToNumberTheorists Primes ... PublicKey(RSALabs) Elliptic Curves: CerticomTutorial Fermigier ResourcePage ECCCrypto(Joye) Random Numbers: VirtualLib Random Numbers... pLab Server... Ellison:CryptRndNum RSAReport ... RandNumGen Books.. Amazon: Applied Cryptography(Schneier) Codebreakers(Kahn) Contemporary Cryptology(Simmons) Cryptography and Data Security(Denning) ... Official Pgp User Guide(Zimmermann) PGP.. VirtualLib MITdistribution International MITPubKeyServer ... PrettyGoodPrivacyInc Thoughts.. WhichOfTheFollowingDoesNotBelong? DeclarationOfIndependence U.S.Constitution

    98. AMS Special Session On Cryptography And Number Theory
    AMS Special Session. Ohio State University, Columbus, Ohio; 2123 September 2001.
    http://euclid.butler.edu/~sorenson/ams.html
    AMS Special Session on
    Cryptography and Computational and Algorithmic Number Theory
    Ohio State University, Columbus Ohio
    September 21-23, 2001
    Pictures!
    Announcements
    Because of the recent tragic events in New York, Washington, and Pennsylvania, several of our confirmed speakers have had to cancel. The AMS has decided to go forward with the meetings, and so shall we: "We plan to go ahead with the meeting at this time and we will dedicate the meeting to mathematicians, their friends and families who have suffered from the horrible events of Tuesday 11th September."
    Organizers
    Eric Bach , University of Wisconsin at Madison, bach@cs.wisc.edu
    Jon Sorenson
    , Butler University, sorenson@butler.edu
    List of Speakers
    Daniel J. Bernstein, University of Illinois at Chicago
    Larry Gerstein, University of California at Santa Barbara (cancelled)
    Jon Grantham, IDA/CCS (cancelled)
    Joshua Holden, Rose-Hulman Institute of Technology
    Michael Jacobson, University of Manitoba, Canada
    Jee Koh, Indiana University (cancelled)
    Kristin Lauter, Microsoft Corporation (cancelled)

    99. USENIX Technical Program - Abstract - USENIX 99
    Whitepaper presented at USENIX 99 by OpenBSD developers Theo de Raadt, Niklas Hallqvist, Artur Grabowski, Angelo D. Keromytis, and Niels Provos discussing the cryptography employed in OpenBSD.
    http://www.usenix.org/events/usenix99/deraadt.html
    USENIX Technical Program - Abstract - USENIX 99
    Cryptography in OpenBSD: An Overview
    Theo de Raadt, Niklas Hallqvist, Artur Grabowski, Angelos D. Keromytis, and Niels Provos, The OpenBSD Project
    Abstract
    Cryptographic mechanisms are an important security component of an operating system in securing the system itself and its communication paths. Indeed, in many situations, cryptography is the only tool that can solve a particular problem, e.g., network-level security. While cryptography by itself does not guarantee security, when applied correctly, it can significantly improve overall security. Since one of the main foci of the OpenBSD system is security, various cryptographic mechanisms are employed in a number of different roles. This paper gives an overview of the cryptography employed in OpenBSD. We discuss the various components (IPsec, SSL libraries, stronger password encryption, Kerberos IV, random number generators, etc. ), their role in system security, and their interactions with the rest of the system (and, where applicable, the network).
    • View the full text of this paper in HTML form.

    100. Privacy Digest: Privacy News (Civil Rights, Encryption, Free Speech, Cryptograph
    Covers the items directly and indirectly impacting your privacy such as cryptography, wiretaps, Free Speech, DNA and genetic testing, and database tracking in general. Archive goes back to 1997.
    http://www.PrivacyDigest.com/
    Privacy Digest
    Your daily source for news that can impact people's privacy. Search for this: THUNDERSTONE - EPI, INC. Friday, March 21, 2003 CNET NEWS.COM WASHINGTONFans and foes of the controversial soon will have another chance to tell the U.S. government what they think. Slashdot Your Rights Online Library of Congress to Hold DMCA Hearings petong writes "The Library of Congress's will be holding hearings to find out if changes need to be made to the DMCA, according to News.com itweb.co.za - Microsoft ad pulled by ASA [Johannesburg, 20 March 2003] - The Advertising Standards Authority of SA (ASA) has ordered that a Microsoft ad implying that its software will bring about the extinction of the hacker is to be pulled for being "unsubstantiated and misleading". An objection was lodged by freelance journalist Richard Clarke, in his personal capacity, who complained that the advert was untrue. He claimed Microsoft software is littered with vulnerabilities.

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 5     81-100 of 175    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20

    free hit counter