Listing 1 - 6 of 6 |
Sort by
|
Choose an application
Choose an application
Cryptography --- Cryptographie --- History --- Histoire --- History. --- Cryptography - History
Choose an application
Les codes nous accompagnent depuis des millénaires. Avec eux, nous avons construit nos mathématiques et nos sciences, nous avons crypté nos messages, nous avons défini nos religions et nos goûts artistiques. Mais depuis le XXe siècle, ils sont devenus bien plus que de simples outils... On ne peut pas le nier, le code a pris son indépendance. Virus informatiques, cerveaux de robots ou drones militaires, il monte en puissance, verrouille nos maisons et colonise nos vies. Cette transformation défie notre intelligence et remet en question notre place dans l'univers. Le code deviendra-t-il notre rival, ou même notre prédateur ? Cette fabuleuse histoire du codage, abondamment illustrée, offre aussi au lecteur de nombreuses énigmes codées à déchiffrer.
Ciphers --- Cryptography --- Chiffres (Cryptographie) --- Cryptographie --- History --- History. --- Histoire --- Cryptography - History
Choose an application
Alan Turing has long proved a subject of fascination, but following the centenary of his birth in 2012, the code-breaker, computer pioneer, mathematician (and much more) has become even more celebrated with much media coverage, and several meetings, conferences and books raising public awareness of Turing's life and work. This volume will bring together contributions from some of the leading experts on Alan Turing to create a comprehensive guide to Turing that will serve as a useful resource for researchers in the area as well as the increasingly interested general reader. The book will cover aspects of Turing's life and the wide range of his intellectual activities, including mathematics, code-breaking, computer science, logic, artificial intelligence and mathematical biology, as well as his subsequent influence.--
Mathematics: history. --- Cryptography: history. --- Computer science: history. --- Turing, Alan, --- Great Britain.
Choose an application
Cryptography. --- Ciphers. --- Cryptography --- Ciphers --- Cryptographie --- Chiffres (Cryptographie) --- History. --- History --- Histoire --- cryptologie --- 003.26 --- 681.3*D46 --- Cryptografische schriftsoorten. Geheimschrift --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 003.26 Cryptografische schriftsoorten. Geheimschrift --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Data encryption (Computer science) --- Telecommunication services --- Computer architecture. Operating systems --- Cryptography - History
Choose an application
The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over two thousand years governments, armies, and now individuals have wanted to protect their messages from the “enemy”. This desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. On the other hand, for every new system to protect messages there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to finally have the upper hand. New mathematically based cryptographic algorithms that use computers for encryption and decryption are so secure that brute-force techniques seem to be the only way to break them – so far. This work traces the history of the conflict between cryptographer and cryptanalyst, explores in some depth the algorithms created to protect messages, and suggests where the field is going in the future.
Cryptography -- History. --- Data encryption (Computer science) -- History. --- Data structures. --- Engineering & Applied Sciences --- Computer Science --- Algorithms. --- Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Algorism --- Computer science. --- History. --- Data structures (Computer science). --- Computers. --- Computer Science. --- History of Computing. --- Data Structures, Cryptology and Information Theory. --- History of Science. --- Algebra --- Arithmetic --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Foundations --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Annals --- Auxiliary sciences of history --- Informatics --- Science --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Cryptography
Listing 1 - 6 of 6 |
Sort by
|