Make us homepage
Add to Favorites
FAIL (the browser should render some flash content, not this).

Main page » Tag cryptography

Sort by: date | rating | most visited | comments | alphabetically


The Secret History of MI6: 1909-1949
3
 
 

The Secret History of MI6: 1909-1949The Secret History of MI6: 1909-1949

Britain 's Special Intelligence Service, commonly called MI6, is not only the oldest and most storied foreign intelligence unit in the world-it is also the only one to open its archives to an outside researcher. The result, in this authorized history, is an unprecedented and revelatory look at an organization that essentially created, over the course of two world wars, the modern craft of spying. Examining innovations from invisible ink and industrial-scale cryptography to dramatic setbacks like the Nazi sting operations to bag British operatives, this groundbreaking history is as engrossing as any thriller-and much more revealing
 
  More..
Tags: history, industrial-scale, cryptography, dramatic, invisible, Secret, 1909-1949, History, innovations
Cryptography: A Very Short Introduction
3
 
 
Cryptography: A Very Short IntroductionThis book is a clear and informative introduction to cryptography and data protection--subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. Important areas are highlighted, such as Stream Ciphers, block ciphers, public key algorithms, digital signatures, and applications such as e-commerce. This book highlights the explosive impact of cryptography on modern society, with, for example, the evolution of the internet and the introduction of more sophisticated banking methods.
 
  More..
Tags: algorithms, introduction, cryptography, explosive, modern
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography
0
 
 

The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum CryptographyThe Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography

"Singh spins tales of cryptic intrigue in every chapter." -The Wall Street Journal
"Brings together . . . the geniuses who have secured communications, saved lives, and influenced the fate of nations. A pleasure to read." -Chicago Tribune




Dear User, your publication has been rejected because THE PASSWORD IS DIFFERENT FROM OUR STANDARD (englishtips.org). All publications must have our standard password or have no password at all.
Please see the RULES page (http://englishtips.org/rules_for_publishing.html) for more detail. Fix your publication and send a PM to Admin or any Trusted Contributor, stating the publication title/URL, so that we know it has been fixed and is ready for approval.


 
  More..
Tags: pleasure, -Chicago, nations, influenced, lives, Cryptography, Evolution, Scots, Quantum, Secrecy
Number Story: From Counting to Cryptography
5
 
 

Number Story: From Counting to CryptographyNumber Story: From Counting to Cryptography

Peter Higgins distills centuries of work into one delightful narrative that celebrates the mystery of numbers and explains how different kinds of numbers arose and why they are useful. Full of historical snippets and interesting examples, the book ranges from simple number puzzles and magic tricks, to showing how ideas about numbers relate to real-world problems, such as: How are our bank account details kept secure when shopping over the internet? What are the chances of winning at Russian roulette; or of being dealt a flush in a poker hand?
 
  More..
Tags: numbers, details, secure, shopping, internet, Number, Story, Cryptography, Counting
Foundations of Cryptography: Volume 2, Basic Applications
3
 
 

Foundations of Cryptography: Volume 2, Basic ApplicationsFoundations of Cryptography: Volume 2, Basic Applications

Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in the first volume, this second volume of Foundations of Cryptography contains a rigorous and systematic treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It is suitable for use in a graduate course on cryptography and as a reference book for experts. 
 
  More..
Tags: Cryptography, basic, systems, volume, Foundations