Publisher: United States Department of the Army 1990
Text contains six parts: Introduction to Cryptanalysis, Monographic Substitution Systems, Polygraphic Substitution Systems, Polyalphabetic Substitution Systems, Transposition Systems, and Analysis of Code Systems. Text also contains exhaustive material to aid in the solution of cipher systems, including frequency distributions, word and pattern tables, as well as utility tables.
Home page url
Download or read it online for free here:
(multiple PDF/PS files)
by Bing Qi, Li Qian, Hoi-Kwong Lo - arXiv
We present the principles behind quantum key distribution and discuss a few well-known QKD protocols. We focus more on the implementation of QKD protocols rather than security analysis. Another topic covered here is the security of QKD systems.
by Neal Koblitz (ed.) - Springer
Contents: Universal Hashing and Multiple Authentication; Asymmetric Cryptography with a Hidden Monomial; Hidden Collisions on DSS; All Bits in ax + b mod p are Hard; Robust and Efficient Sharing of RSA Functions; Improved Differential Attacks on RC5.
by Al Sweigart
The book teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, etc.
by Dan Boneh, Victor Shoup - cryptobook.us
This book is about constructing practical cryptosystems for which we can argue security under plausible assumptions. The book covers many constructions for different tasks in cryptography. For each task we define a precise security goal ...