Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Cryptography


1. 

A Cryptography Primer

A Cryptography Primer

By: Philip N. Klein

Publisher: Cambridge University Press

Publication Date: 31-MAR-2014

Insert Date: 05-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail...

2. 

Cryptography InfoSec Pro Guide

Cryptography InfoSec Pro Guide

By: Sean-Philip Oriyano

Publisher: McGraw-Hill

Publication Date: 26-JUL-2013

Insert Date: 03-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

Security Smarts for the Self-Guided IT ProfessionalThis complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. ...

3. 

Secret History: The Story of Cryptology

Secret History: The Story of Cryptology

By: Craig Bauer

Publisher: Chapman and Hall/CRC

Publication Date: 25-MAR-2013

Insert Date: 12-SEP-2013

Slots: 1.0

Table of Contents • Start Reading

Most available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History gives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical prerequisites, the book presents the mathematics in sufficient detail and weaves the history throughout the chapters. In addition to the fascinating historical and political sides of cryptology, the author—a former Scholar-in-Residence at the U.S. National Security Agency Center for Cryptologic History—includes interesting instances of codes and ciphers...

4. 

New Directions of Modern Cryptography

New Directions of Modern Cryptography

By: Zhenfu Cao

Publisher: CRC Press

Publication Date: 06-DEC-2012

Insert Date: 03-SEP-2013

Slots: 1.0

Table of Contents • Start Reading

The study of cryptography is motivated by and driven forward by security requirements. This volume presents the fundamental definitions, precise assumptions, and rigorous security proofs of cryptographic primitives and related protocols. It also describes how they originated from security requirements and how they are applied. It provides vivid demonstrations of how modern cryptographic techniques can be used to solve security problems. The applications cover wired and wireless communication networks, satellite communication networks, multicast/broadcast and TV networks, and newly emerging...

5. 

Introduction to Cryptography with Open-Source Software

Introduction to Cryptography with Open-Source Software

By: Alasdair McAndrew

Publisher: CRC Press

Publication Date: 24-MAY-2011

Insert Date: 25-AUG-2013

Slots: 1.0

Table of Contents • Start Reading

This text illustrates algorithms and cryptosystems using examples and the open-source computer algebra system of Sage. It enables students to run their own programs and develop a deep and solid understanding of the mechanics of cryptography. The author, a noted educator in the field, covers the methods, algorithms, and applications of modern cryptographic systems. He provides a highly practical learning experience by progressing at a gentle pace, keeping mathematics at a manageable level, and including numerous end-of-chapter exercises. ...

6. 

Algebraic Curves in Cryptography

Algebraic Curves in Cryptography

By: San Ling; Huaxiong Wang; Chaoping Xing

Publisher: Chapman and Hall/CRC

Publication Date: 13-JUN-2013

Insert Date: 25-AUG-2013

Slots: 1.0

Table of Contents • Start Reading

This self-contained book is one of the first to focus on many topics in cryptography involving algebraic curves. After supplying the necessary background on algebraic curves, the authors discuss error-correcting codes, including algebraic geometry codes, and provide an introduction to elliptic curves. Each chapter in the remainder of the book deals with a selected topic in cryptography (other than elliptic curve cryptography). The topics covered include secret sharing schemes, authentication codes, frameproof codes, key distribution schemes, broadcast encryption, and sequences. ...

7. 

Visual Cryptography and Secret Image Sharing

Visual Cryptography and Secret Image Sharing

By: Stelvio Cimato; Ching-Nung Yang

Publisher: CRC Press

Publication Date: 10-AUG-2011

Insert Date: 24-AUG-2013

Slots: 1.0

Table of Contents • Start Reading

This book covers an extensive range of topics related to visual cryptography techniques and secure image sharing solutions. It addresses sharing multiple secrets and visual cryptography schemes based on the probabilistic reconstruction of the secret image, including pictures in the distributed shares, contrast enhancement techniques, visual cryptography schemes based on different logical operations for combining shared images, cheating prevention, and the alignment problem for image shares. The book also describes practical applications, steganography, and authentication. Case studies...

8. 

Broadband Quantum Cryptography

Broadband Quantum Cryptography

By: Daniel Rogers

Publisher: Morgan & Claypool Publishers

Publication Date: 11-NOV-2010

Insert Date: 23-AUG-2013

Slots: 1.0

Table of Contents • Start Reading

Quantum cryptography is a rapidly developing field that draws from a number of disciplines, from quantum optics to information theory to electrical engineering. By combining some fundamental quantum mechanical principles of single photons with various aspects of information theory, quantum cryptography represents a fundamental shift in the basis for security from numerical complexity to the fundamental physical nature of the communications channel. As such, it promises the holy grail of data security: theoretically unbreakable encryption. Of course, implementing quantum cryptography in real...

9. 

Cryptology: Classical and Modern with Maplets

Cryptology: Classical and Modern with Maplets

By: Richard Klima; Neil Sigmon

Publisher: Chapman and Hall/CRC

Publication Date: 20-JUN-2012

Insert Date: 16-AUG-2013

Slots: 1.0

Table of Contents • Start Reading

In a clear, nontechnical manner, this text explains how fundamental mathematical concepts are the bases of cryptographic algorithms. It covers the Enigma machine and Navajo code used during World War II, describes the implementation and cryptanalysis of classical ciphers, and gives straightforward explanations of the AES, public-key ciphers, and message authentication. The book assumes minimal mathematical prerequisites and incorporates easy-to-use Maplets throughout that provide practical examples of the techniques. The Maplets are available for download online. A solutions manual is...

10. 

Die Geheimschriften und die Dechiffrirkunst

Die Geheimschriften und die Dechiffrirkunst

By: Friedrich W. Kasiski

Publisher: E.S. Mittler und Sohn

Publication Date: 01-JAN-1863

Insert Date: 24-JUL-2013

Slots: 1.0

Table of Contents • Start Reading

Die Geheimschriften und die Dechiffrirkunst ist ein klassischer Text auf Kryptologie. ...

11. 

L’Art de Chiffrer et Déchiffrer les Dépêches Secrètes

L’Art de Chiffrer et Déchiffrer les Dépêches Secrètes

By: Le Marquis de Viaris

Publisher: Gauthier-Villars et Fils

Publication Date: 01-JAN-1893

Insert Date: 24-JUL-2013

Slots: 1.0

Table of Contents • Start Reading

L’Art de Chiffrer et Déchiffrer les Dépêches Secrètes est un texte classique sur la cryptologie. ...

12. 

Theory and Practice of Cryptography Solutions for Secure Information Systems

Theory and Practice of Cryptography Solutions for Secure Information Systems

By: Atilla Elçi; Josef Pieprzyk; Alexander Chefranov; Mehmet Orgun; Huaxiong Wang; Rajan Shankaran

Publisher: IGI Global

Publication Date: 31-MAY-2013

Insert Date: 24-JUL-2013

Slots: 1.0

Table of Contents • Start Reading

Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of...

13. 

Kryptografie, 5th Edition

Kryptografie, 5th Edition

By: Klaus Schmeh

Publisher: dpunkt

Publication Date: 01-FEB-2013

Insert Date: 18-APR-2013

Slots: 1.0

Table of Contents • Start Reading

Aktualisierte und erweiterte Neuauflage des Standardwerks- Hat sich in der Ausbildung (Uni/FH) etabliert.- Ist umfassender als alle anderen aktuellen Kryptografie-Werke - Leichter Zugang, kommt mit relativ wenig Mathematik aus.- Enthält viele praktischen Informationen ...

14. 

Machine Learning in Image Steganalysis

Machine Learning in Image Steganalysis

By: Hans Georg Schaathun

Publisher: Wiley-IEEE Press

Publication Date: 04-OCT-2012

Insert Date: 22-JAN-2013

Slots: 1.0

Table of Contents • Start Reading

Steganography is the art of communicating a secret message, hiding the very existence of a secret message. This is typically done by hiding the message within a non-sensitive document. Steganalysis is the art and science of detecting such hidden messages. The task in steganalysis is to take an object (communication) and classify it as either a steganogram or a clean document. Most recent solutions apply classification algorithms from machine learning and pattern recognition, which tackle problems too complex for analytical solution by teaching computers to learn from empirical...

15. 

Data Hiding

Data Hiding

By: Michael T. Raggo; Chet Hosmer

Publisher: Syngress

Publication Date: 31-DEC-2012

Insert Date: 22-JAN-2013

Slots: 1.0

Table of Contents • Start Reading

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the...

16. 

Chaos Synchronization and Cryptography for Secure Communications

Chaos Synchronization and Cryptography for Secure Communications

By: Santo Banerjee

Publisher: IGI Global

Publication Date: 31-JUL-2010

Insert Date: 30-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

Over the past few decades, there has been numerous research studies conducted involving the synchronization of dynamical systems with several theoretical studies and laboratory experimentations demonstrating the pivotal role for this phenomenon in secure communications. Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption explores the combination of ordinary and time delayed systems and their applications in cryptographic encoding. This innovative publication presents a critical mass of the most sought after research, providing relevant theoretical...

17. 

Foundations of Cryptography

Foundations of Cryptography

By: Oded Goldreich

Publisher: Cambridge University Press

Publication Date: 06-AUG-2001

Insert Date: 29-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It focuses on the basic mathematical tools: computational difficulty (one-way functions), pseudorandomness and zero-knowledge proofs. The emphasis is on the clarification of fundamental concepts and on...

18. 

Foundations of Cryptography

Foundations of Cryptography

By: Oded Goldreich

Publisher: Cambridge University Press

Publication Date: 10-MAY-2004

Insert Date: 28-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Foundations of Cryptography presents a rigorous and systematic treatment of foundational issues, defining cryptographic tasks and solving cryptographic problems. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving several central cryptographic problems, as opposed to describing ad-hoc approaches. This second volume contains a...

19. 

Disappearing Cryptography, 2nd Edition

Disappearing Cryptography, 2nd Edition

By: Peter Wayner

Publisher: Morgan Kaufmann

Publication Date: 29-APR-2002

Insert Date: 10-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all. This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data...

20. 

Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition

Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition

By: 

Publisher: John Wiley & Sons

Publication Date: 18-OCT-1996

Insert Date: 03-JUL-2012

Slots: 1.0

Table of Contents • Start Reading

". . .the best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine ". . .the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how...