Home > Cryptography (Total 429 Records)
Versteckte Botschaften (TELEPOLIS): Die faszinierende Geschichte der Steganografie
Cryptography By:Klaus Schmeh 2017-00-00 00:00:00
Die Fantasie der Menschen beim Schmuggeln geheimer Daten ist nahezu grenzenlos: Ein im Schuhabsatz versteckter Mikrofilm, das Tarnen einer Spionagenachricht als Zigarrenbestellung, das Schreiben mit Geheimtinte, das Verbergen von Daten in harmlosen Bildern und Zinken- Codes – dies sind nur einige ---Cryptography
Tags: die der geschichte versteckte botschaften telepolis faszinierende steganografie
Bitcoin pour les Nuls poche [French]
Cryptography By:- 2017-00-00 00:00:00
Decouvrez enfin la nouvelle monnaie universelle ! Le Bitcoin est une technologie pair a pair qui fonctionne sans autorite centrale. La gestion des transactions et la creation de bitcoins est prise en charge collectivement par le reseau. Le Bitcoin est libre et ouvert. Sa conception est publique, pe ---Cryptography
Disappearing Cryptography, Third Edition: Information Hiding: Steganography and Watermarking (The Morgan Kaufmann Series in Software Engineering and Programming)
Cryptography By:Peter Wayner 2008-12-17 00:00:00
Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passw ---Cryptography
Tags: programming software information engineering series cryptography hiding watermarking steganography disappearing
Cryptography: An Introduction (Student Mathematical Library, Vol. 18) (Student Mathematical Library, V. 18)
Cryptography By:V. V. Yashchenko 2002-11-21 00:00:00
Learning about cryptography requires examining fundamental issues about information security. Questions abound, ranging from 'From whom are we protecting ourselves?' and 'How can we measure levels of security?' to 'What are our opponent's capabilities?' and 'What are their goals?' Answering these qu ---Cryptography
Automorphic Forms, Reprensentations, and L-Functions. (Part 2)
Cryptography By:Armand Borel 1979-11-00 00:00:00
Contains sections on Automorphic representations and L-functions as well as Arithmetical algebraic geometry and L-functions. ---Cryptography
Tags: forms automorphic
Advances in Cryptology - EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, ... (Lecture Notes in Computer Science)
Cryptography By:Phong Q. Nguyen 2014-04-02 00:00:00
This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions ---annual international conference, cryptographic techniques, public key cryptanalysis, lecture notes, multi linear maps
Tags: computer cryptographic application technique theory lecture science cryptology annual conference copenhagen eurocrypt
Einfuhrung in die Kryptographie (Springer-Lehrbuch) (German Edition) [German]
Cryptography By:Johannes Buchmann 2016-05-21 00:00:00
In dem Lehrbuch werden die Techniken der modernen Kryptographie vermittelt, z. B. Verschlsselung oder digitale Signaturen. Die fr ein przises Verstndnis der Kryptographie notwendige Mathematik wird durch viele Beispiele und bungen nachvollziehbar gemacht. ---techniken der modernen, verschlsselung oder digitale, einfuhrung
Tags: die einfuhrung kryptographie
Kryptologie: Eine Einfuhrung in die Wissenschaft vom Verschlusseln, Verbergen und Verheimlichen [German]
Cryptography By:Albrecht Beutelspacher 2002-00-00 00:00:00
"Albrecht Beutelspacher wei? wie nur wenige Autorenkollegen (und Mathematiker) leicht verdaulich und amusant in die Wissenschaft vom Verschlusseln, Verbergen und Verheimlichen einzufuhren. [...] Beutelspacher stellt die wichtigsten Kryptologie-Verfahren mit Code-Beispielen dar, auch die Public-key-V ---mathematiker leicht verdaulich, verstandlich beschrieben, verheimlichen einzufuhren, wissenschaft, fur
Tags: die einfuhrung eine kryptologie vom wissenschaft verbergen verheimlichen verschlusseln
Selected Areas in Cryptography SAC 2013: 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers (Lecture Notes in Computer Science)
Cryptography By:Tanja Lange 2014-05-21 00:00:00
This book constitutes the proceedings of the 20th International Conference on Selected Areas in Cryptography, SAC 2013, held in Burnaby, Canada, in August 2013. The 26 papers presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections nam ---20th international conference, cryptography sac, crypto block ciphers, lecture notes, selected papers
Tags: computer cryptography area lecture science conference papers burnaby sac
Error-correcting Codes, Finite Geometries and Cryptography (Contemporary Mathematics)
Cryptography By:Aiden A. Bruen 2010-09-03 00:00:00
The volume features cutting-edge theoretical results on the Reed-Muller and Reed-Solomon codes, classical linear codes, codes from nets and block designs, LDPC codes, perfect quantum and orthogonal codes, iterative decoding, magnetic storage and digital memory devices, and MIMO channels. There are n ---finite geometries, finite geometries concerns, cutting-edge theoretical results, classical linear codes, affine planes.error-correcting codes
Tags: cryptography mathematics codes contemporary finite geometries