Probabilistic and Statistical Methods in Cryptology: An Introduction by Selected Topics Author: Daniel Neuenschwander Published by Springer Berlin Heidelberg ISBN: 978-3-540-22001-5 DOI: 10.1007/b97045 Table of Contents: Introduction 1 Classical Polyalphabetic Substitution Ciphers 2 RSA and Probabilistic Prime Number Tests 3 Factorization with Quantum Computers: Shor’s Algorithm 4 Physical Random-Number Generators 5 Pseudo-random Number Generators 6 An Information Theory Primer 7 Tests for...
Topics: Cryptography, Cryptography, Cryptography, Ciphers
16
16
Nov 24, 2020
11/20
by
Hubbard, Ben
texts
eye 16
favorite 2
comment 0
32 pages : 25 cm
Topics: Cryptography -- Juvenile literature, Cryptography
109
109
Mar 1, 2018
03/18
by
Huckle, Helen
texts
eye 109
favorite 4
comment 0
Includes 1 page of code wheels
Topics: Cryptography, Cryptography -- Juvenile literature
10
10.0
May 14, 2021
05/21
by
Poskitt, Kjartan
texts
eye 10
favorite 1
comment 0
60 pages : 20 cm
Topics: Cryptography -- Juvenile literature, Cryptography
Boolean bent functions have desirable cryptographic properties in that they have maximum nonlinearity, which hardens a cryptographic function against linear cryptanalysis attacks. Furthermore, bent functions are extremely rare and difficult to find. Consequently, little is known generally about the characteristics of bent functions. One method of representing Boolean functions is with a reduced ordered binary decision diagram. Binary decision diagrams (BDD) represent functions in a tree...
Topic: Cryptography
This study examines the problem of assuring correct functionality of cryptographic protocol verifiers. As a replacement for manual input of well-known protocols, we propose the creation of a random protocol generator capable of producing protocols of varying degrees of correctness. This generator would be verifier-independent, and the protocols translated into verifier languages as required. This would automate not only the creation of protocols, but eliminate the variability both in...
Topic: Cryptography
243
243
Nov 10, 2010
11/10
by
Hunt, Bernice Kohn; Aloise, Frank E., illus
texts
eye 243
favorite 8
comment 0
Published under the author's earliest name: Bernice Kohn
Topic: Cryptography
4,169
4.2K
Feb 28, 2009
02/09
by
Meister, Aloys, 1866- [from old catalog]; George Fabyan Collection (Library of Congress) DLC [from old catalog]
texts
eye 4,169
favorite 0
comment 0
Book digitized by Google from the library of Harvard University and uploaded to the Internet Archive by user tpb.
Topic: Cryptography
Source: http://books.google.com/books?id=Ua8BAAAAYAAJ&oe=UTF-8
88
88
May 20, 2013
05/13
by
Kahn, David, 1930-
texts
eye 88
favorite 1
comment 0
153
153
Mar 7, 2012
03/12
by
Kippenhahn, Rudolf, 1926-
texts
eye 153
favorite 11
comment 0
Includes bibliographical references (p. [273]-275) and index
Topic: Cryptography
The ability to distribute cryptographic keys securely has been a challenge for centuries. The Diffie-Hellman key exchange protocol was the first practical solution to the key exchange dilemma. The Diffie-Hellman protocol allows two parties to exchange a secret key over unsecured communication channels without meeting in advance. The secret key can then be used in a symmetric encryption application, and the two parties can communicate securely. However, if the key exchange takes place in certain...
Topic: Cryptography
California Digital Library
4,772
4.8K
Aug 8, 2008
08/08
by
Langie, André, b. 1871-; Macbeth, James Cruickshank Henderson
texts
eye 4,772
favorite 14
comment 1
Bibliography: p. 158. Subtitle on cover [Cryptography ... a study on secret writings]
favoritefavoritefavoritefavorite ( 1 reviews )
Topic: Cryptography
333
333
Dec 21, 2009
12/09
by
Zim, Herbert S. (Herbert Spencer), 1909-1994
texts
eye 333
favorite 15
comment 0
146
146
Sep 25, 2012
09/12
by
Kahn, David, 1930-
texts
eye 146
favorite 3
comment 0
Includes bibliographical references and index
Topic: Cryptography
57
57
Sep 9, 2011
09/11
by
Moore, Dan Tyler. [from old catalog]; Waller, Martha (Stifler), 1920- [from old catalog]
texts
eye 57
favorite 2
comment 0
1,612
1.6K
Dec 11, 2013
12/13
by
Meister, Aloys, 1866-1925
texts
eye 1,612
favorite 1
comment 0
5 p.l., [3]-450 p. 25 cm
Topic: Cryptography
370
370
Oct 13, 2010
10/10
by
Yardley, Herbert O. (Herbert Osborn), 1889-1958
texts
eye 370
favorite 15
comment 0
In this study, we investigated an algebraic-type attack, known as the cube attack, against wireless networks. We implemented the cube attack in a wireless system, namely Bluetooth. We formally modeled the encryption function of E0 Bluetooth key generator and automated the process of the cube attack on E0 of the factorization process (preprocessing phase). In this phase, an attacker finds as many maxterms (a term of the encryption function such that its co-factor is a linear nonconstant...
Topic: Cryptography
Cryptography, An Introduction : Third Edition The third edition is now online. You may make copies and distribute the copies of the book as you see fit, as long as it is clearly marked as having been authored by N.P. Smart. We give a numbering system to present versions. The first number presents the edition number The second number represents a correction which is major, i.e. something absolutely crucial has been corrected. The third number represents a minor change, e.g. small addition etc....
Topic: cryptography
677
677
Jul 12, 2011
07/11
by
Simonetta, Francesco, 1410-1480; Perret, Paul Michel, 1861-1893 [Editor]
texts
eye 677
favorite 0
comment 0
Book from Project Gutenberg: Les règles de Cicco Simonetta pour le déchiffrement des écritures secrètes Library of Congress Classification: Z
Topic: Cryptography
Source: http://www.gutenberg.org/ebooks/28227
8
8.0
Mar 15, 2022
03/22
by
Oppliger, Rolf
texts
eye 8
favorite 1
comment 0
xxv, 503 p. : 24 cm
Topic: Cryptography
17
17
Jun 1, 2021
06/21
by
Patterson, Wayne, 1945-
texts
eye 17
favorite 1
comment 0
xxii, 312 p. : 24 cm
Topic: Cryptography
Folkscanomy Miscellaneous
4,513
4.5K
Jan 21, 2015
01/15
by
Adam Hyde, Marta Peirano, Asher Wolf, Julian Oliver, Danja Vasiliev, Malte Dik, Jan Gerber, Brian Newbold, Brendan Howell
texts
eye 4,513
favorite 9
comment 0
Attend a CryptoParty to learn and teach how to use basic cryptography tools . A CryptoParty is free, public and fun. It is an open format where everyone is welcome independent of their age, gender or knowledge. People bring their computers, mobile devices, and a willingness to learn! CryptoParty is a decentralized, global initiative to introduce the most basic cryptography software and the fundamental concepts of their operation to the general public, such as the Tor anonymity network, public...
Topic: Cryptography
90
90
May 20, 2019
05/19
by
Akira Takahashi; Mehdi Tobouchi
texts
eye 90
favorite 0
comment 0
837
837
Nov 22, 2018
11/18
by
Trithemius, Johannes, 1462-1516
texts
eye 837
favorite 5
comment 0
8 unnumbered pages, 364 pages, 4 unnumbered pages ; (4to)
Topic: Cryptography
84
84
Dec 12, 2011
12/11
by
Williams, Eugenia
texts
eye 84
favorite 5
comment 0
126 p. 24 cm
Topic: Cryptography
Thomas Fisher Rare Book Library
2,875
2.9K
Nov 16, 2009
11/09
by
Falconer, John, decipherer; J.F; F., J; Steuart, of Allanton (bookplate)
texts
eye 2,875
favorite 18
comment 0
Gibson 387
Topic: Cryptography
In this thesis, a generic genetic algorithm (GA) is presented that is implemented on a reconfigurable computer. Our GA is implemented such that many problems can be solved by simply adapting the problem to the GA. For example, part of this process involves the customization of the fitness function of the given problem to the GA. The size of the problem is limited by the capacity of a field programmable gate array that is part of the reconfigurable computer. We apply this to bent functions,...
Topic: Cryptography
32
32
Jan 12, 2021
01/21
by
Patterson, Wayne, 1945-
texts
eye 32
favorite 1
comment 0
xxii, 312 p. : 24 cm
Topic: Cryptography
Linear attacks against cryptosystems can be defeated when combiner functions are composed of highly nonlinear Boolean functions. The highest nonlinearity Boolean functions, or bent functions, are not common- especially when they have many variables-bent functions are difficult to find. Understanding what properties are common to bent functions will help ease the search for them. Using the SRC-6 reconfigurable computer, functions can be generated or tested at a rate much higher than a PC. This...
Topic: Cryptography
6,326
6.3K
May 1, 2007
05/07
by
Langie, Andr b. 1871-; George Fabyan Collection (Library of Congress) DLC; Macbeth, James Cruickshank Henderson, 1874- tr
texts
eye 6,326
favorite 13
comment 0
Bibliography: p. 158
Topic: Cryptography
30
30
Dec 4, 2020
12/20
by
O'Brien, Eileen, 1970-
texts
eye 30
favorite 6
comment 0
32 pages : 25 cm
Topics: Cryptography -- Juvenile literature, Cryptography, Ciphers
30
30
Oct 26, 2021
10/21
by
Piper, F. C. (Frederick Charles), 1940-
texts
eye 30
favorite 3
comment 0
142 p. : 18 cm
Topic: Cryptography
7
7.0
Jul 30, 2021
07/21
by
Patterson, Wayne, 1945-
texts
eye 7
favorite 0
comment 0
xxii, 312 p. : 24 cm
Topic: Cryptography
392
392
Oct 25, 2011
10/11
by
Johnson, Bud
texts
eye 392
favorite 11
comment 0
44
44
Jul 18, 2020
07/20
by
Singh, Simon
texts
eye 44
favorite 4
comment 0
xi, 224 pages : 24 cm
Topics: Cryptography -- History, Cryptography, Kryptologie, Geschichte
23
23
Jul 8, 2021
07/21
by
Singh, Simon
texts
eye 23
favorite 4
comment 0
263 pages : 20 cm
Topics: Cryptography, Cryptography -- History, Ciphers, Confidential communications
8
8.0
Nov 20, 2020
11/20
by
Wyllie, James, author
texts
eye 8
favorite 0
comment 0
1 volume ; 20 cm
Topics: World War, 1914-1918 -- Cryptography, Cryptography
7
7.0
Apr 5, 2022
04/22
by
Talbot, John
texts
eye 7
favorite 0
comment 0
1 online resource (xii, 292 pages) :
Topics: Cryptography, Computational complexity, COMPUTERS -- Security -- Cryptography
The metadata below describe the original scanning. Follow the "All Files: HTTP" link in the "View the book" box to the left to find XML files that contain more metadata about the original images and the derived formats (OCR results, PDF etc.). See also the What is the directory structure for the texts? FAQ for information about file content and naming conventions.
Topics: Shorthand, Cryptography, Shorthand -- Bibliography, Cryptography -- Bibliography
45
45
Oct 13, 2021
10/21
by
Pincock, Stephen
texts
eye 45
favorite 2
comment 0
176 p. : 23 cm
Topics: Cryptography, Cryptography -- History, Ciphers, Ciphers -- History
23
23
Nov 4, 2021
11/21
by
Pickover, Clifford A
texts
eye 23
favorite 2
comment 0
99 p. : 26 cm
Topics: Cryptography, Cryptography -- Problems, exercises, etc, Runes
32
32
Jan 21, 2022
01/22
by
Lunde, Paul, 1943-
texts
eye 32
favorite 0
comment 0
pages cm
Topics: Ciphers -- History, Cryptography -- History, Ciphers, Cryptography
15
15
Nov 30, 2020
11/20
by
Wyllie, James, author
texts
eye 15
favorite 0
comment 0
1 volume ; 24 cm
Topics: World War, 1914-1918 -- Cryptography, Cryptography
45
45
Jan 28, 2021
01/21
by
Singh, Simon
texts
eye 45
favorite 5
comment 0
263 pages : 20 cm
Topics: Cryptography, Cryptography -- History, Ciphers, Confidential communications
10
10.0
Apr 13, 2022
04/22
by
Givierge, Marcel
texts
eye 10
favorite 1
comment 0
164 pages : 28 cm
Topics: Cryptography -- Textbooks, Cryptography, Dechiffrierung, Kryptologie, Chiffre
62
62
Aug 16, 2021
08/21
by
Pincock, Stephen
texts
eye 62
favorite 4
comment 0
176 pages : 23 cm
Topics: Cryptography, Cryptography -- History, Ciphers, Ciphers -- History
32
32
Jun 19, 2020
06/20
by
Price Hossell, Karen, 1957-
texts
eye 32
favorite 7
comment 0
48 pages : 27 cm
Topics: Cryptography -- Juvenile literature, Ciphers -- Juvenile literature, Cryptography, Ciphers,...
86
86
Oct 14, 2009
10/09
by
Miller, Marvin
texts
eye 86
favorite 3
comment 0
These codes were previously published in Boy's Life magazine
Topics: Cryptography, Ciphers