|
- Bibliography of cryptography - Wikipedia
Cryptography: An introduction ISBN 0-07-709987-7 Similar in intent to Applied Cryptography but less comprehensive Covers more modern material and is aimed at undergraduates covering topics such as number theory and group theory not generally covered in cryptography books Stinson, Douglas (2005) Cryptography: Theory and Practice ISBN 1-58488
- Yehuda Lindell - Wikipedia
Introduction to Modern Cryptography, 2nd Edition Chapman and Hall ISBN 978-1466570269 Yehuda Lindell, ed (2017) Tutorials on the Foundations of Cryptography Springer ISBN 978-3-319-57047-1 Jonathan Katz and Yehuda Lindell (2020) Introduction to Modern Cryptography, 3rd Edition Chapman and Hall ISBN 978-0815354369
- Outline of cryptography - Wikipedia
The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information Modern cryptography intersects the disciplines of mathematics, computer science, and engineering Applications of cryptography include ATM cards, computer passwords, and electronic commerce
- Communication Theory of Secrecy Systems - Wikipedia
"Communication Theory of Secrecy Systems" is a paper published in 1949 by Claude Shannon discussing cryptography from the viewpoint of information theory [1] It is one of the foundational treatments (arguably the foundational treatment) of modern cryptography [2] His work has been described as a "turning point, and marked the closure of classical cryptography and the beginning of modern
- Cryptography - Wikipedia
Before the modern era, cryptography focused on message confidentiality (i e , encryption)—conversion of messages from a comprehensible form into an incomprehensible one and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely the key needed for decryption of that message) Encryption attempted to ensure secrecy in
- Symmetric-key algorithm - Wikipedia
Symmetric-key algorithms require both the sender and the recipient of a message to have the same secret key All early cryptographic systems required either the sender or the recipient to somehow receive a copy of that secret key over a physically secure channel Nearly all modern cryptographic systems still use symmetric-key algorithms internally to encrypt the bulk of the messages, but they
- Block cipher - Wikipedia
Block cipher In cryptography, a block cipher is a deterministic algorithm that operates on fixed-length groups of bits, called blocks Block ciphers are the elementary building blocks of many cryptographic protocols They are ubiquitous in the storage and exchange of data, where such data is secured and authenticated via encryption
- Coding theory - Wikipedia
Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in practice by any adversary It is theoretically possible to break such a system, but it is infeasible to do so by any known practical
|
|
|