Subcategories
JOIN NOW!
https://www.facebook.com/AvaxHomeLearning/ facebook.com/AvaxHomeLearning

Timing Channels in Cryptography: A Micro-Architectural Perspective (Repost)

Posted By: step778
Timing Channels in Cryptography: A Micro-Architectural Perspective (Repost)

Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya, "Timing Channels in Cryptography: A Micro-Architectural Perspective"
2014 | pages: 162 | ISBN: 3319123696 | PDF | 6,1 mb

A Cryptography Primer: Secrets and Promises (repost)

Posted By: roxul
A Cryptography Primer: Secrets and Promises (repost)

Philip N. Klein, "A Cryptography Primer: Secrets and Promises"
English | ISBN: 1107017882, 1107603455 | 2014 | 216 pages | PDF | 2 MB

Primality Testing in Polynomial Time: From Randomized Algorithms to "PRIMES Is in P" (Lecture Notes in Computer Science)

Posted By: thingska
Primality Testing in Polynomial Time: From Randomized Algorithms to "PRIMES Is in P" (Lecture Notes in Computer Science)

Primality Testing in Polynomial Time: From Randomized Algorithms to "PRIMES Is in P" (Lecture Notes in Computer Science) by Martin Dietzfelbinger
English | 2008 | ISBN: 3540403442, 9783540403449 | 150 Pages | PDF | 984.62 KB

Cryptography: An Introduction, 3rd Edition (repost)

Posted By: arundhati
Cryptography: An Introduction, 3rd Edition (repost)

Nigel Smart, "Cryptography: An Introduction, 3rd Edition"
2004 | ISBN: 0077099877 | 433 pages | PDF | 2 MB

Encyclopedia of Cryptography and Security [Repost]

Posted By: tanas.olesya
Encyclopedia of Cryptography and Security  [Repost]

Encyclopedia of Cryptography and Security by Henk C.A. van Tilborg
English | 6 Sept. 2005 | ISBN: 038723473X | 684 Pages | PDF | 5 MB

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A–Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security.

Cryptanalytic Attacks on RSA [Repost]

Posted By: tanas.olesya
Cryptanalytic Attacks on RSA [Repost]

Cryptanalytic Attacks on RSA by Song Y. Yan
English | 26 Nov. 2007 | ISBN: 0387487417 | 276 Pages | PDF | 3 MB

RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital world.

Investigator's Guide to Steganography [Repost]

Posted By: tanas.olesya
Investigator's Guide to Steganography  [Repost]

Investigator's Guide to Steganography by Gregory Kipper
English | 27 Oct. 2003 | ISBN: 0849324335 | 240 Pages | CHM | 6 MB

Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to.

Coding Theory and Cryptography

Posted By: tanas.olesya
Coding Theory and Cryptography

Coding Theory and Cryptography: The Essentials by D.C. Hankerson
English | 4 Aug. 2000 | ISBN: 0824704657 | 368 Pages | CHM | 3 MB

Selected Areas in Cryptography

Posted By: tanas.olesya
Selected Areas in Cryptography

Selected Areas in Cryptography - SAC 2014 (Lecture Notes in Computer Science) by Antoine Joux
English | 8 Dec. 2014 | ISBN: 3319130501 | 392 Pages | PDF | 11 MB

The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and…

RSA Security's Official Guide to Cryptography [Repost]

Posted By: tanas.olesya
RSA Security's Official Guide to Cryptography [Repost]

RSA Security's Official Guide to Cryptography by Steve Burnett
English | 1 Apr. 2001 | ISBN: 007213139X | 449 Pages | PDF | 9 MB

Want to keep your Web site safe? Learn how to implement cryptography, the most secure form of data encryption. Highly accessible, and packed with detailed case studies, this practical guide is written in conjunction with RSA Security - the most trusted name in e-security.

The Cryptoclub [Repost]

Posted By: tanas.olesya
The Cryptoclub [Repost]

The Cryptoclub: Using Mathematics to Make and Break Secret Codes by Janet Beissinger
English | 11 Aug. 2006 | ISBN: 156881223X | 139 Pages | PDF | 5 MB

Join the Cryptokids as they apply basic mathematics to make and break secret codes. This book has many hands-on activities that have been tested in both classrooms and informal settings.

Cryptography and Public Key Infrastructure on the Internet

Posted By: tanas.olesya
Cryptography and Public Key Infrastructure on the Internet

Cryptography and Public Key Infrastructure on the Internet by Klaus Schmeh
English | 17 Apr. 2003 | ISBN: 047084745X | 488 Pages | PDF | 12 MB

A practical guide to Cryptography and its use in the Internet and other communication networks.

Progress in Cryptology [Repost]

Posted By: tanas.olesya
Progress in Cryptology [Repost]

Progress in Cryptology - AFRICACRYPT 2010 Security and Cryptology)456 by Daniel J. Bernstein
English | 14 Apr. 2010 | ISBN: 3642126774 | 447 Pages | PDF | 5 MB

This book constitutes the proceedings of the Third International Conference on Cryptology in Africa, AFRICACRYPT 2010, held in Stellenbosch, South Africa, on May 3-6, 2010. The 25 papers presented together with three invited talks were carefully reviewed and selected from 82 submissions.

Decrypted Secrets [Repost]

Posted By: tanas.olesya
Decrypted Secrets [Repost]

Decrypted Secrets: Methods and Maxims of Cryptology by Friedrich L. Bauer
English | 6 Oct. 2006 | ISBN: 3540245022 | 556 Pages | PDF | 12 MB

In today's extensively wired world, cryptology is vital for guarding communication channels, databases, and software from intruders.

Codes: The Guide to Secrecy From Ancient to Modern Times [Repost]

Posted By: tanas.olesya
Codes: The Guide to Secrecy From Ancient to Modern Times [Repost]

Codes: The Guide to Secrecy From Ancient to Modern Times by Richard A. Mollin
English | 24 May 2005 | ISBN: 1584884703 | 704 Pages | PDF | 5 MB

From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems.