Logo

Cryptography

e-books in Cryptography category

Book cover: A Graduate Course in Applied CryptographyA Graduate Course in Applied Cryptography
by - cryptobook.us ,
This book is about constructing practical cryptosystems for which we can argue security under plausible assumptions. The book covers many constructions for different tasks in cryptography. For each task we define a precise security goal ...
(6382 views)
Book cover: Practical Cryptography for DevelopersPractical Cryptography for Developers
by - Nakov.com ,
This book will teach you the basics of applied cryptography in almost free of math style, following a step-by-step approach with lots of code examples and practical exercises (hands-on experience), just like when you learn Web development ...
(6566 views)

Book cover: Cracking Codes with PythonCracking Codes with Python
by - inventwithpython.com ,
The book teaches complete beginners how to program in the Python programming language. It features the source code to several ciphers and hacking programs for these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.
(12151 views)
Book cover: Practical Cryptography With GoPractical Cryptography With Go
by - Leanpub ,
This is an introduction to cryptography for programmers; it doesn't aim to teach the theory, but rather to guide you in your attempt to understand how to use cryptography to secure your services. We'll illustrate it using the Go programming language.
(8210 views)
Book cover: Cryptography: An IntroductionCryptography: An Introduction
by - McGraw-Hill ,
Nigel Smart's 'Cryptography' provides the rigorous detail required for advanced cryptographic studies, yet approaches the subject matter in an accessible style in order to gently guide new students through difficult mathematical topics.
(12443 views)
Book cover: Hacking Secret Ciphers with PythonHacking Secret Ciphers with Python
by ,
The book teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, etc.
(23086 views)
Book cover: Mathematical CryptologyMathematical Cryptology
by - Tampere University of Technology ,
These notes contain the central mathematical background needed for understanding modern data encryption methods, and introduce applications in cryptography and various protocols. The fledgling quantum cryptography is briefly introduced.
(14747 views)
Book cover: Visual Cryptography and Its ApplicationsVisual Cryptography and Its Applications
by - BookBoon ,
Visual cryptography provides a technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed, the original secret can be discovered without computer participation.
(11103 views)
Book cover: Invent with PythonInvent with Python
by - inventwithpython.com ,
This book describes several encryption programs for various ciphers, along with how to write programs that can break these ciphers. The book is for complete beginners, it will teach you how to encrypt and decrypt messages.
(13741 views)
Book cover: Military CryptanalysisMilitary Cryptanalysis
by - NSA ,
One of the most well-respected publications on cryptanalysis, as was written by William F. Friedman, one of the true experts in the field. Now declassified by the NSA, this book is key in helping individuals understand and solve cipher systems.
(17415 views)
Book cover: The Laws of Cryptography with Java CodeThe Laws of Cryptography with Java Code
by - Univ. of Texas San Antonio ,
The author is trying to find a middle ground, a gentle introduction to selected topics in cryptography without avoiding the mathematics. The material is aimed at undergraduate computer science students, but will be accessible to many others.
(13317 views)
Book cover: Public-Key Cryptography: Theory and PracticePublic-Key Cryptography: Theory and Practice
by - TU Darmstadt ,
Multiple aspects of public-key cryptography are examined. The author covers the theory of provably secure public-key cryptography and the implementation of exponentiation and multi-exponentiation. An introduction to provable security is provided.
(13991 views)
Book cover: Basic CryptanalysisBasic Cryptanalysis
- United States Department of the Army ,
Introduction to cryptanalysis, monographic, polygraphic, and polyalphabetic substitution systems, transposition systems, analysis of code systems. Text also contains exhaustive material to aid in the solution of cipher systems.
(14691 views)
Book cover: A brief introduction of quantum cryptography for engineersA brief introduction of quantum cryptography for engineers
by - arXiv ,
We present the principles behind quantum key distribution and discuss a few well-known QKD protocols. We focus more on the implementation of QKD protocols rather than security analysis. Another topic covered here is the security of QKD systems.
(14178 views)
Book cover: Quantum CryptographyQuantum Cryptography
by - arXiv ,
Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The fast progress in theory and experiments over the recent years are reviewed, with emphasis on open questions and technological issues.
(15011 views)
Book cover: Introduction to Modern CryptographyIntroduction to Modern Cryptography
by - University of California at Davis ,
The viewpoint taken throughout these notes is to emphasize the theory of cryptography as it can be applied to practice. This is an approach that the authors have pursued in the research, and it seems to be a pedagogically desirable approach as well.
(16685 views)
Book cover: Foundations of CryptographyFoundations of Cryptography
by - Cambridge University Press ,
The book gives the mathematical underpinnings for cryptography; this includes one-way functions, pseudorandom generators, and zero-knowledge proofs. Throughout, definitions are complete and detailed; proofs are rigorous and given in full.
(17302 views)
Book cover: An introduction to CryptographyAn introduction to Cryptography
by ,
This guide describes how to use PGP to manage your organization’s messages and data. It is an overview of the terminology and concepts of PGP products. It contains discussions of security, privacy, and the vulnerabilities inherent in PGP.
(17567 views)
Book cover: Lecture Notes on CryptographyLecture Notes on Cryptography
by ,
This is a set of lecture notes on cryptography for a one week long course on cryptography taught at MIT. The thread followed by these notes is to develop and explain the notion of provable security and its usage for the design of secure protocols.
(15574 views)
Book cover: Handbook of Applied CryptographyHandbook of Applied Cryptography
by - CRC-Press ,
This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography.
(34045 views)
Book cover: Cryptography, A Study on Secret WritingsCryptography, A Study on Secret Writings
by - Aegean Park Press ,
A classic in cryptographic literature. Text is divided into parts: Descriptions of the principal systems of cryptography; Examples of deciphering (cryptanalysis); Lists and tables with bibliography; plus a section titled 'The Playfair Cipher'.
(21728 views)