580ad98e9d894.jpeg
PDF
Foundations of Cryptography: Volume 2, Basic Applications

Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in the first volume, this second volume of Foundations of Cryptography contains a rigorous and systematic treatment of three basic applications: Encryption, Signatures, and General Cryptograph...

58085767f01c3.jpeg
PDF
Break the Code: Cryptography for Beginners

No, it's not a message from outer space! Just read it backwards, starting from the bottom line, to discover what this specially coded message says. (The extra letter "X" at the beginning was thrown in just to make the message a bit more mysterious.) Codes have been used for centuries. Now, with the help of this entertaining book, you, too, will be able to decipher dozens of secret messages. Veteran cryptographer Bud Johnson not only ...

58085766b22de.jpeg
PDF
Implementing SSL / TLS Using Cryptography and PKI

Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this practical book is for you.  Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have a working knowledge of cryptography. The book covers SSLv2, TLS 1.0, and TLS 1.2, including imp...

5804c64f2f998.jpeg
PDF
Computational Number Theory and Modern Cryptography

The only book to provide a unified view of the interplay between computational number theory and cryptography Computational number theory and modern cryptography are two of the most important and fundamental research fields in information security. In this book, Song Y. Yang combines knowledge of these two critical fields, providing a unified view of the relationships between computational number theory and cryptography. The author t...

565b21acdf81e.jpeg
PDF
Coding and Cryptology

There are two basic methods of error control for communication, both involving coding of the messages. With forward error correction, the codes are used to detect and correct errors. In a repeat request system, the codes are used to detect errors and, if there are errors, request a retransmission. Error detection is usually much simpler to implement than error correction and is widely used. However, it is given a very cursory treatme...

56570df047698.jpg
PDF
Secret History: The Story of Cryptology

The book presents a wonderful story of the development of this field. It is written more like a novel than like your traditional textbook, but it contains all the necessary material to also serve as a textbook. In fact, the author has created a companion website that provides sample syllabi and problems if the book is to be used in the classroom. … This book is enjoyable. I would recommend it to anyone interested in learning more abo...

565589037e1a3.jpg
CHM
The Twofish Encryption Algorithm: A 128-Bit Block Cipher

The first and only guide to one of today's most important new cryptography algorithms The Twofish Encryption Algorithm A symmetric block cipher that accepts keys of any length, up to 256 bits, Twofish is among the new encryption algorithms being considered by the National Institute of Science and Technology (NIST) as a replacement for the DES algorithm. Highly secure and flexible, Twofish works extremely well with large microprocesso...

565589017e741.jpg
PDF
Group Theoretic Cryptography

Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the life sciences. Many cryptographic constructions exploit the computational hardness of group theoretical problems, and the area is viewed as a potential source of quantum-resilient cryptographic primitives for the future. Group Theoretic Cryptography supplies an ideal introduction to cryptog...

56502d659a8e0.jpg
PDF
Understanding And Applying Cryptography And Data Security

  A How-to Guide for Implementing Algorithms and Protocols Addressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. Derived from the author’s teaching notes and research publications, the text is designed for electrical engineering and computer science courses. Provides the Fou...