e99 Online Shopping Mall
Help | |
Home - Science - Cryptography (Books) |
  | Back | 81-100 of 100 |
click price to see details click image to enlarge click link to go to the store
81. Cryptography's Role in Securing the Information Society by Committee to Study National Cryptography Policy, National Research Council | |
Hardcover: 720
Pages
(1996-10-25)
list price: US$44.95 -- used & new: US$13.85 (price subject to change: see help) Asin: 0309054753 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (3)
Essential, but with two flaws It has two flaws, one minor and inevitable, the other more serious. The first stems from the fact that the National Research Council undertakes studies like this only at the request of the US government. The federal government is notorious for its belief that anything worth saying should be said in the dullest possible bureaucratese. I know the staff members who produced the actual text of this book; they are excellent writers, and did their best to make the book readable within the constraints imposed by government mindset, but it's still dull and tedious to read. Compared to the Federal Register, however, it's a model of expository clarity. The second flaw is the very cursory treatment given to one of the most serious problems in using cryptography for information security. The great majority of civilian computers, and even some military computers, are vulnerable to a wide variety of viruses, worms and trojan horses, and in most cases the users and system administrators are unaware of how vulnerable they are. Cryptography is completely useless as a protective mechanism if cleartext or keys can be retrieved and transmitted from an originating or destination computer by a program inserted by an attacker. Equally serious, if the attacker substitutes trojan horse code for the encipherment/decipherment techniques employed, the whole system is wide open. I regard this as the current greatest weakness in the use of cryptography for information security, except within certain parts of the military. I dn't have any good ideas at all about how to plug this weakness, but it deserves much more careful attention than it gets in this book. If you are responsible for any aspect of computer or communications security, think hard about this problem.
Not obsolete yet
A valuable reference. |
82. Number-theoretic Algorithms in Cryptography (Translations of Mathematical Monographs) by O. N. Vasilenko | |
Hardcover: 248
Pages
(2006-12-05)
list price: US$89.00 -- used & new: US$62.46 (price subject to change: see help) Asin: 0821840908 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
83. The Mathematics of Ciphers: Number Theory and RSA Cryptography by S.C. Coutinho | |
Hardcover: 196
Pages
(1999-01-15)
list price: US$49.00 -- used & new: US$35.95 (price subject to change: see help) Asin: 1568810822 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (4)
Good introduction to RSA
all about understanding RSA
Excellent introduction
multiplication |
84. Quantum Communications and Cryptography (Optical Science and Engineering) | |
Hardcover: 248
Pages
(2005-11-14)
list price: US$129.95 -- used & new: US$86.90 (price subject to change: see help) Asin: 0849336848 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Quantum Communications and Cryptography is the first comprehensive review of the past, present, and potential developments in this dynamic field. Leading expert contributors from around the world discuss the scientific foundations, experimental and theoretical developments, and cutting-edge technical and engineering advances in quantum communications and cryptography. The book describes the engineering principles and practical implementations in a real-world metropolitan network as well as physical principles and experimental results of such technologies as entanglement swapping and quantum teleportation. It also offers the first detailed treatment of quantum information processing with continuous variables. Technologies include both free-space and fiber-based communications systems along with the necessary protocols and information processing approaches. Bridging the gap between physics and engineering, Quantum Communications and Cryptography supplies a springboard for further developments and breakthroughs in this rapidly growing area. |
85. Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity by Manfred R. Schroeder | |
Paperback: 456
Pages
(2009-12-09)
list price: US$99.00 -- used & new: US$79.11 (price subject to change: see help) Asin: 3642099017 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (2)
Good mix of theory and mathematics
could have included some problems |
86. A Classical Introduction to Cryptography Exercise Book by Thomas Baigneres, Pascal Junod, Yi Lu, Jean Monnerat, Serge Vaudenay | |
Paperback: 254
Pages
(2010-11-02)
list price: US$39.95 -- used & new: US$39.95 (price subject to change: see help) Asin: 1441939121 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material used by the authors and given as examinations to advanced-level students of the Cryptography and Security Lecture at EPFL from 2000 to mid-2005. A Classical Introduction to Cryptography Exercise Book covers a majority of the subjects that make up today's cryptology, including symmetric or public-key cryptography, cryptographic protocols, design, cryptanalysis, and implementation of cryptosystems. Exercises do not require an extensive background in mathematics, since the most important notions are introduced and discussed in many of the exercises. The authors expect the readers to be comfortable with basic facts of discrete probability theory, discrete mathematics, calculus, algebra, and computer science. Following the model of A Classical Introduction to Cryptography: Applications for Communications Security, exercises related to the more advanced parts of the textbook are marked with a star. |
87. Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting | |
Hardcover: 355
Pages
(2007-12-14)
list price: US$89.95 -- used & new: US$57.84 (price subject to change: see help) Asin: 3540716408 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description This book consists of a collection of works on utilizing the automatic identification technology provided by Radio Frequency Identification (RFID) to address the problems of global counterfeiting of goods. The book presents current research, directed to securing supply chains against the efforts of counterfeit operators, carried out at the Auto-ID Labs around the globe. It assumes very little knowledge on the part of the reader on Networked RFID systems as the material provided in the introduction familiarizes the reader with concepts, underlying principles and vulnerabilities of modern RFID systems. |
88. Computer Security and Cryptography by Alan G. Konheim | |
Hardcover: 544
Pages
(2007-01-29)
list price: US$120.00 -- used & new: US$79.16 (price subject to change: see help) Asin: 0471947830 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems. The author contributed to the design and analysis of the Data Encryption Standard (DES), a widely used symmetric-key encryption algorithm. His recommendations are based on firsthand experience of what does and does not work. Thorough in its coverage, the book starts with a discussion of the history of cryptography, including a description of the basic encryption systems and many of the cipher systems used in the twentieth century. The author then discusses the theory of symmetric- and public-key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn the practical limitations of the technology. The book ends with two chapters that explore a wide range of cryptography applications. Three basic types of chapters are featured to facilitate learning: With consumers becoming increasingly wary of identity theft and companies struggling to develop safe, secure systems, this book is essential reading for professionals in e-commerce and information technology. Written by a professor who teaches cryptography, it is also ideal for students. |
89. Innovative Cryptography (Programming Series) by Nick Moldovyan, Alex Moldovyan | |
Paperback: 425
Pages
(2006-06-14)
list price: US$49.95 -- used & new: US$4.00 (price subject to change: see help) Asin: 1584504676 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
90. Cryptography and Security Services: Mechanisms and Applications by Manuel Mogollon | |
Hardcover: 490
Pages
(2008-01-07)
list price: US$99.95 -- used & new: US$81.85 (price subject to change: see help) Asin: 159904837X Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (1)
Not that good |
91. Formal Correctness of Security Protocols (Information Security and Cryptography) by Giampaolo Bella | |
Paperback: 274
Pages
(2010-11-02)
list price: US$89.95 -- used & new: US$89.95 (price subject to change: see help) Asin: 3642087825 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. The method of analysis turns out to be both powerful and flexible. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating. |
92. Broadband Quantum Cryptography (Synthesis Lectures on Quantum Computing) by Daniel J. Rogers | |
Paperback: 100
Pages
(2010-04-05)
list price: US$35.00 -- used & new: US$30.92 (price subject to change: see help) Asin: 1608450597 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (1)
Accessible and excellent introduction to the subject |
93. Handbook of Elliptic and Hyperelliptic Curve Cryptography (Discrete Mathematics and Its Applications) | |
Hardcover: 848
Pages
(2005-07-19)
list price: US$109.95 -- used & new: US$54.31 (price subject to change: see help) Asin: 1584885181 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description The Handbook of Elliptic and Hyperelliptic Curve Cryptography introduces the theory and algorithms involved in curve-based cryptography. After a very detailed exposition of the mathematical background, it provides ready-to-implement algorithms for the group operations and computation of pairings. It explores methods for point counting and constructing curves with the complex multiplication method and provides the algorithms in an explicit manner. It also surveys generic methods to compute discrete logarithms and details index calculus methods for hyperelliptic curves. For some special curves the discrete logarithm problem can be transferred to an easier one; the consequences are explained and suggestions for good choices are given. The authors present applications to protocols for discrete-logarithm-based systems (including bilinear structures) and explain the use of elliptic and hyperelliptic curves in factorization and primality proving. Two chapters explore their design and efficient implementations in smart cards. Practical and theoretical aspects of side-channel attacks and countermeasures and a chapter devoted to (pseudo-)random number generation round off the exposition. The broad coverage of all- important areas makes this book a complete handbook of elliptic and hyperelliptic curve cryptography and an invaluable reference to anyone interested in this exciting field. Customer Reviews (4)
Very thorough, but...
A seminal work in its field
One of the best books on this domain
Very understandable overview of modern developments |
94. The Story of Magic, Memoirs of an American Cryptologic Pioneer (Cryptography) by Frank B. Rowlett, Frank B. Rowlett | |
Hardcover: 258
Pages
(1998-09-01)
list price: US$32.80 -- used & new: US$25.00 (price subject to change: see help) Asin: 0894122738 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (5)
A tribute to a genius and a true patriot
a reader's review This book was published as a well bound, hardback, dust jacketed book by Aegean Park Press, a publishing house well known for re-printing (keeping available and alive) important Cryptanalytical, Cryptological, Cryptograhic publications in softcover 8-1/2" x 11" format.Just the way this particular publishing house, who specializes in crypto works is treating this book "screams" the high regard they have for it. If you're looking for crypto course work, the how-to-do-it, Aegean Park Press has it, (though not in this book).If you are looking for the taste and feel, the heart and soul of real cryptanalysts enjoying their work, that IS the form & substance of this book; as well as being an important historical work.
Nothing new but in greater detail
A fascinating book on World War II secert communications.
Fascinating reading for anyone interested in cryptography His book demonstrates how he applied his genius in extremely high stakesmilitary situations involving the development and application of codebreaking and encryption technology. The author is able to keep thereader's interest in dealing with a complex subject. An intriguingdisclosure of highly secret activities that moves one from the days of the"Little Orphan Annie Secret Decoder Pin" to the ultimate in theuse of electronic machines in the 1940's. ... Read more |
95. Progress on Cryptography: 25 Years of Cryptography in China (The Springer International Series in Engineering and Computer Science) | |
Hardcover: 262
Pages
(2004-04-28)
list price: US$159.00 -- used & new: US$11.81 (price subject to change: see help) Asin: 1402079869 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Cryptography in Chinese consists of two characters meaning "secret coded". Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond "secret coding". China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are Professor Xiao's former students. Progress on Cryptography: 25 Years of Cryptography in China is a compilation of papers presented at an international workshop in conjunction with the ChinaCrypt, 2004. After 20 years, the research interests of the group have extended to a variety of areas in cryptography. This edited volume includes 32 contributed chapters. The material will cover a range of topics, from mathematical results of cryptography to practical applications. This book also includes a sample of research, conducted by Professor Xiao's former and current students. Progress on Cryptography: 25 Years of Cryptography in China is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science, mathematics and engineering. |
96. Public Key Cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, ... (Lecture Notes in Computer Science) | |
Paperback: 423
Pages
(2001-02-23)
list price: US$74.95 -- used & new: US$62.68 (price subject to change: see help) Asin: 3540416587 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
97. Six Lectures Concerning Cryptography and Cryptanalysis (Cryptographic Series , No. 67) by William F. Friedman | |
Paperback: 251
Pages
(1996-04)
list price: US$34.80 -- used & new: US$33.91 (price subject to change: see help) Asin: 0894122460 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (1)
Classic Material but Poorly Reproduced |
98. Cryptography and Secure Communications (Mcgraw-Hill Series on Computer Communications) by Man Young Rhee | |
Hardcover: 504
Pages
(1994-02)
list price: US$55.00 -- used & new: US$24.95 (price subject to change: see help) Asin: 0071125027 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
99. Practical Cryptography for Data Internetworks | |
Paperback: 356
Pages
(1996-01)
list price: US$55.00 -- used & new: US$55.00 (price subject to change: see help) Asin: 0818671408 Canada | United Kingdom | Germany | France | Japan | |
100. Information theory, coding and cryptography by Ranjan Bose | |
Unknown Binding: 277
Pages
(2003)
-- used & new: US$89.93 (price subject to change: see help) Asin: 0071231331 Canada | United Kingdom | Germany | France | Japan | |
  | Back | 81-100 of 100 |