Listing 1 - 10 of 11 | << page >> |
Sort by
|
Choose an application
Writing --- Cryptography --- Ciphers --- Cryptographie --- Chiffres (Cryptographie) --- 003.26 --- Codebreaking --- Codebreaking. --- Cryptography. --- Decryptement
Choose an application
Mathematical control systems --- cryptografie --- Chiffrement --- Coderingstheorie --- Codes secrets --- Codification [Théorie de ] --- Coding theory --- Correspondance secrète --- Cryptage --- Cryptanalyse --- Cryptanalysis --- Cryptografie --- Cryptographie --- Cryptography --- Cryptologie --- Cryptology --- Déchiffrement --- Décodage --- Décryptage --- Décryptement --- Lettres secrètes --- Messages cryptographiques --- Secret codes --- Secret writing --- Steganography --- Stéganographie --- Théorie de codification --- Écriture cryptographique --- Écriture secrète --- Cryptography. --- Coding theory.
Choose an application
Chiffrement --- Codes secrets --- Computer security --- Computerbeveiliging --- Computergegevens--Bescherming --- Computers--Beveiliging --- Correspondance secrète --- Cryptage --- Cryptanalyse --- Cryptanalysis --- Cryptografie --- Cryptographie --- Cryptography --- Cryptologie --- Cryptology --- Data protection --- Données [Protection des ] --- Déchiffrement --- Décodage --- Décryptage --- Décryptement --- Gegevens--Bescherming --- Gegevensbescherming --- Informatique--Sécurité --- Lettres secrètes --- Messages cryptographiques --- Protection des données --- Secret codes --- Secret writing --- Steganography --- Stéganographie --- Sécurité informatique --- Écriture cryptographique --- Écriture secrète
Choose an application
Chiffrement --- Codes secrets --- Correspondance secrète --- Cryptage --- Cryptanalyse --- Cryptanalysis --- Cryptografie --- Cryptographie --- Cryptography --- Cryptologie --- Cryptology --- Déchiffrement --- Décodage --- Décryptage --- Décryptement --- Lettres secrètes --- Messages cryptographiques --- Secret codes --- Secret writing --- Steganography --- Stéganographie --- Écriture cryptographique --- Écriture secrète --- Computers --- Access control --- #TELE:SISTA --- 681.3*E3 --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Cryptography. --- Computers - Access control.
Choose an application
Chiffrement --- Codes secrets --- Correspondance secrète --- Cryptage --- Cryptanalyse --- Cryptanalysis --- Cryptografie --- Cryptographie --- Cryptography --- Cryptologie --- Cryptology --- Déchiffrement --- Décodage --- Décryptage --- Décryptement --- Lettres secrètes --- Messages cryptographiques --- Secret codes --- Secret writing --- Steganography --- Stéganographie --- Écriture cryptographique --- Écriture secrète --- Données --- informatique --- Compression (Informatique) --- Data compression (Computer science) --- Data processing --- Informatique --- Données --- Data processing. --- Computer Science
Choose an application
Chiffrement --- Codes secrets --- Correspondance secrète --- Cryptage --- Cryptage des données (Ordinatique) --- Cryptanalyse --- Cryptanalysis --- Cryptografie --- Cryptographie --- Cryptography --- Cryptologie --- Cryptology --- Data encryption (Computer science) --- Data-encryptie (Computerleer) --- Data-encryptie (Computerwetenschap) --- Déchiffrement --- Décodage --- Décryptage --- Décryptement --- Lettres secrètes --- Messages cryptographiques --- Secret codes --- Secret writing --- Steganography --- Stéganographie --- Écriture cryptographique --- Écriture secrète --- Credit cards --- Electronic funds transfers --- Cartes de crédit --- Monnaie électronique --- Data processing --- Informatique --- Cartes de crédit --- Monnaie électronique --- Electronic funds transfers.
Choose an application
This book, based on the author's Ph.D. thesis, was selected during the 1995 GI Doctoral Dissertation Competition as the winning thesis in the foundations-of-informatics track. Securing integrity for digital communications in the age of global electronic information exchange and electronic commerce is vital to democratic societies and a central technical challenge for cryptologists. As core contribution to advancing the state of the art, the author develops the new class of digital fail-stop signatures. This monograph is self-contained regarding the historical background and cryptographic primitives used. For the first time, a general and sophisticated framework is introduced in which innovative fail-stop signatures are systematically presented and evaluated, from theoretical foundations to engineering aspects.
Chiffrement --- Codes secrets --- Computer security --- Computerbeveiliging --- Computers--Beveiliging --- Correspondance secrète --- Cryptage --- Cryptanalyse --- Cryptanalysis --- Cryptografie --- Cryptographie --- Cryptography --- Cryptologie --- Cryptology --- Déchiffrement --- Décodage --- Décryptage --- Décryptement --- Handtekeningen --- Informatique--Sécurité --- Lettres secrètes --- Messages cryptographiques --- Secret codes --- Secret writing --- Signaturen --- Signatures --- Signatures (Writing) --- Steganography --- Stéganographie --- Sécurité informatique --- Écriture cryptographique --- Écriture secrète --- Computer security. --- Cryptography. --- Sécurité informatique --- Computer science. --- Data encryption (Computer science). --- Computer software. --- Computer Communication Networks. --- Data Storage Representation. --- Cryptology. --- Algorithm Analysis and Problem Complexity. --- Software, Computer --- Computer systems --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science)
Choose an application
Chiffrement --- Codes secrets --- Computer security --- Computerbeveiliging --- Computers--Beveiliging --- Correspondance secrète --- Cryptage --- Cryptanalyse --- Cryptanalysis --- Cryptografie --- Cryptographie --- Cryptography --- Cryptologie --- Cryptology --- Déchiffrement --- Décodage --- Décryptage --- Décryptement --- Informatique--Sécurité --- Lettres secrètes --- Messages cryptographiques --- Secret codes --- Secret writing --- Steganography --- Stéganographie --- Sécurité informatique --- Écriture cryptographique --- Écriture secrète --- Computer security. --- Cryptography. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Protection --- Security measures --- Theses
Choose an application
Chiffrement --- Codes secrets --- Correspondance secrète --- Cryptage --- Cryptanalyse --- Cryptanalysis --- Cryptografie --- Cryptographie --- Cryptography --- Cryptologie --- Cryptology --- Déchiffrement --- Décodage --- Décryptage --- Décryptement --- Fractales --- Fractals --- Geometry [Non-Euclidean ] --- Getaltheorie --- Géometrie non-euclidienne --- Lettres secrètes --- Meetkunde [Niet-euclidische ] --- Messages cryptographiques --- Nombres [Theorie des ] --- Number theory --- Secret codes --- Secret writing --- Steganography --- Stéganographie --- Écriture cryptographique --- Écriture secrète --- Geometry, Non-Euclidean --- Géométrie non-euclidienne --- Théorie des nombres --- Geometry, Non-Euclidean. --- Number theory. --- Fractals. --- Cryptography. --- Géométrie non-euclidienne --- Théorie des nombres --- Number study --- Numbers, Theory of --- Algebra --- Non-Euclidean geometry --- Geometry --- Parallels (Geometry) --- Fractal geometry --- Fractal sets --- Geometry, Fractal --- Sets, Fractal --- Sets of fractional dimension --- Dimension theory (Topology) --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Foundations --- Geometry, Non-Euclidian. --- Number Theory --- Mathematiques --- Geometrie classique --- Arithmetique --- Vulgarisation
Choose an application
This report on the state of the art and future directions of public-key cryptography is published in accordance with the terms of reference of the European Institute for System Security (EISS). The EISS was founded in 1988 by cabinet resolution of the state government of Baden-W}rttemberg and its basic task is scientific research and knowledge transfer in the field of security in telecommunications and computer and information systems. This report gives the results of an EISS workshop on public-keycryptography and contains seven chapters: an introduction, the scope of the workshop, the topics chosen, classification and description of the most prominent public-key systems, the dependence of public-key cryptography on computational number theory, mistakes and problems with public-key systems, and a projection of needs and requirements for public-key systems. It is addressed to all members of the computer science community: systems developers, researchers, decision makers, standardization committees, patent offices, and users and customers of secure computer systems.
Chiffrement --- Codes secrets --- Correspondance secrète --- Cryptage --- Cryptanalyse --- Cryptanalysis --- Cryptografie --- Cryptographie --- Cryptography --- Cryptologie --- Cryptology --- Déchiffrement --- Décodage --- Décryptage --- Décryptement --- Lettres secrètes --- Messages cryptographiques --- Secret codes --- Secret writing --- Steganography --- Stéganographie --- Écriture cryptographique --- Écriture secrète --- Computers --- Access control --- -Public key cryptography --- 681.3*E3 --- 681.3*F21 --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Data encryption: data encryption standard; DES; public key cryptosystems --- Numerical algorithms and problems: computation of transforms; computations infinite fields; computations on matrices; computations on polynomials; numer-theoretic computations--See also {681.3*G1}; {681.3*G4}; {681.3*I1} --- 681.3*F21 Numerical algorithms and problems: computation of transforms; computations infinite fields; computations on matrices; computations on polynomials; numer-theoretic computations--See also {681.3*G1}; {681.3*G4}; {681.3*I1} --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Cryptography. --- Public key cryptography --- Computer security --- Computers - Access control. --- Data encryption (Computer science). --- Computer software. --- Cryptology. --- Algorithm Analysis and Problem Complexity. --- Software, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science)
Listing 1 - 10 of 11 | << page >> |
Sort by
|