Book:Cryptography

Results: 81



#Item
11Cryptography / Books on cryptography / Elliptic curve cryptography / Cryptanalysis / RSA / Key size / Public-key cryptography / Cryptographic hash function / Outline of cryptography / Cipher / Block cipher / Elliptic curve

The Book Review Column1 by William Gasarch Department of Computer Science University of Maryland at College Park College Park, MD, 20742 email:

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2014-06-30 10:38:30
12Privacy of telecommunications / Mass surveillance / Crime prevention / Privacy law / Telephone tapping / National Security Agency / Cryptography / Communications Assistance for Law Enforcement Act / Computer security / National security / Security / Surveillance

PART Three In the final section of the book, I cover three themes: politics, management, and assurance. Given that we now have some idea how to provide protection, the three big questions are: what are you allowed to do

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-25 09:42:31
13Cryptography / Science / Technology / Knowledge / Fellows of the Royal Society / Roger Needham / Locksmithing

About the Author Why should I have been the person to write this book? Well, I seem to have accumulated the right mix of experience and qualifications over the last 25 years. I graduated in mathematics and natural scien

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 09:36:59
14Internet protocols / Computing / Internet / Cryptographic software / Internet standards / Transport Layer Security / HTTP Secure / Cipher suite / OpenSSL / Cryptography / Secure communication / Cryptographic protocols

Preface You are about to undertake a journey into the mysterious world of cryptography. I’ve just completed mine—writing this book—and it’s been an amazing experience. Although I’d been a user of SSL since its

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-08 18:16:46
15Cryptographic protocols / Public-key cryptography / Diffie–Hellman problem / Diffie–Hellman key exchange / XTR / Discrete logarithm / ElGamal encryption / Subliminal channels / RSA / Cryptography / Computational hardness assumptions / Finite fields

Minding your p’s and q’s Ross Anderson1 , Serge Vaudenay2 1 Computer Laboratory, Pembroke Street, Cambridge, CB2 3QG, England Ecole Normal Sup´erieure — DMI, 45 rue d’Ulm, 75230 Paris, France

Add to Reading List

Source URL: book.huihoo.com

Language: English - Date: 2006-07-27 09:21:33
16Athletics / Paralympic Games / Public key certificate / Referee / Sports / Public-key cryptography / Track and field

ATHLETICS TRACK APPLICATION FORM FOR CLAIMING A WTFUSA RECORD Reference must be made to the current edition of the IPC Athletics/WFTUSA Rule Book IPC: 14/15 WTFUSA: 2015 □ USA MASTER 35 __ 50 __ 60 __ □ USA ADULT □

Add to Reading List

Source URL: www.wasusa.org

Language: English
17Computer security / Crime prevention / National security / Computer network security / Security engineering / Encryption / Vulnerability / Password / Tamper resistance / Security / Cryptography / Cyberwarfare

Security Engineering: A Guide to Building Dependable Distributed Systems PART One In this section of the book, I cover the basics of security engineering technology.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-23 11:43:54
18Public safety / Cryptography / Computer network security / Electronic commerce / Information security / Encryption / Computer security / Security / Crime prevention / National security

Comments to the Green Book “La protection juridique des services crypt´es dans le march´e int´erieur” Dr. Josep Domingo-Ferrer Ricardo X. S´anchez del Castillo

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1998-03-17 14:33:24
19Internet protocols / Network management / Simple Network Management Protocol / Diffie–Hellman key exchange / Whitfield Diffie / Index of cryptography articles / Book:Cryptography / Cryptography / Cryptographic protocols / Computing

Communication & Network Security DigiSAFE LinkCrypt Reliable and Transparent Link Security

Add to Reading List

Source URL: www.digisafe.com

Language: English - Date: 2014-10-24 02:05:31
20Speech processing / Cryptography / Audio engineering / Mixed-excitation linear prediction / Technology / Estimation theory / Vocoder / Speech coding / PESQ / Electronics / Signal processing / Speech enhancement

Pre-Processing of Noisy Speech for Voice Coders Tarun Agarwal Department of Electrical & Computer Engineering McGill University

Add to Reading List

Source URL: dsp-book.narod.ru

Language: English - Date: 2013-05-06 00:54:10
UPDATE