Some facets of complexity theory and cryptography: A five-lecture tutorial
ACM Computing Surveys (CSUR)
Digital invisible ink and its applications in steganography
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Ganzúa: A cryptanalysis tool for monoalphabetic and polyalphabetic ciphers
Journal on Educational Resources in Computing (JERIC)
Facts and Myths of Enigma: breaking stereotypes
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Hi-index | 0.00 |
From the Publisher:Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses -- cryptography. The second part deals with the process of covertly decrypting a secret code -- cryptanalysis -- where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. "Decrypted Secrets" has become a standard book on cryptology. This 3rd edition has again been revised and extended in many technical and biographical details.