Listing 1 - 2 of 2 |
Sort by
|
Choose an application
Alan Turing has long proved a subject of fascination, but following the centenary of his birth in 2012, the code-breaker, computer pioneer, mathematician (and much more) has become even more celebrated with much media coverage, and several meetings, conferences and books raising public awareness of Turing's life and work. This volume will bring together contributions from some of the leading experts on Alan Turing to create a comprehensive guide to Turing that will serve as a useful resource for researchers in the area as well as the increasingly interested general reader. The book will cover aspects of Turing's life and the wide range of his intellectual activities, including mathematics, code-breaking, computer science, logic, artificial intelligence and mathematical biology, as well as his subsequent influence.--
Mathematics: history. --- Cryptography: history. --- Computer science: history. --- Turing, Alan, --- Great Britain.
Choose an application
The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over two thousand years governments, armies, and now individuals have wanted to protect their messages from the “enemy”. This desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. On the other hand, for every new system to protect messages there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to finally have the upper hand. New mathematically based cryptographic algorithms that use computers for encryption and decryption are so secure that brute-force techniques seem to be the only way to break them – so far. This work traces the history of the conflict between cryptographer and cryptanalyst, explores in some depth the algorithms created to protect messages, and suggests where the field is going in the future.
Cryptography -- History. --- Data encryption (Computer science) -- History. --- Data structures. --- Engineering & Applied Sciences --- Computer Science --- Algorithms. --- Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Algorism --- Computer science. --- History. --- Data structures (Computer science). --- Computers. --- Computer Science. --- History of Computing. --- Data Structures, Cryptology and Information Theory. --- History of Science. --- Algebra --- Arithmetic --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Foundations --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Annals --- Auxiliary sciences of history --- Informatics --- Science --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Cryptography
Listing 1 - 2 of 2 |
Sort by
|