1. Hacking Secret Ciphers with Python

The book teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, simple substitution cipher, multiplicative and affine ciphers, Vigenere cipher, and hacking programs for each of these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.

2. Mathematical Cryptology

These notes contain the central mathematical background needed for understanding modern data encryption methods, and introduce applications in cryptography and various protocols. The fledgling quantum cryptography is briefly introduced together with its backgrounds.

3. Visual Cryptography and Its Applications

Visual cryptography provides a very powerful technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed exactly together, the original secret can be discovered without computer participation.

4. Military Cryptanalysis

One of the most well-respected publications on cryptanalysis, as was written by William F. Friedman, one of the true experts in the field. Now declassified by the National Security Agency (NSA), this publication is key in helping individuals understand and solve cipher systems.

5. The Laws of Cryptography with Java Code

In this book the author is trying to find a middle ground, a gentle introduction to selected topics in cryptography without avoiding the mathematics. The material is aimed at undergraduate computer science students, but will be accessible and of interest to many others.

6. Public-Key Cryptography: Theory and Practice

This dissertation examines multiple aspects of public-key cryptography. The author covers the theory of provably secure public-key cryptography and the implementation of exponentiation and multi-exponentiation. An introduction to provable security is provided.

7. Basic Cryptanalysis

Text contains six parts: Introduction to Cryptanalysis, Monographic Substitution Systems, Polygraphic Substitution Systems, Polyalphabetic Substitution Systems, Transposition Systems, and Analysis of Code Systems. Text also contains exhaustive material to aid in the solution of cipher systems, including frequency

distributions, word and pattern tables, as well as utility tables.

8. A brief introduction of quantum cryptography for engineers

We present the fundamental principles behind quantum key distribution and discuss a few well-known QKD protocols. Bearing in mind that the majority of our readers are from engineering and experimental optics, we focus more on the experimental implementation of various QKD protocols rather than security analysis. Another important topic that is covered here is the study of the security of practical QKD systems.

9. Quantum Cryptography

Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological issues.

10. Introduction to Modern Cryptography

The viewpoint taken throughout these notes is to emphasize the theory of cryptography as it can be applied to practice. This is an approach that the authors have pursued in their research, and it seems to be a pedagogically desirable approach as well.

The book teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, simple substitution cipher, multiplicative and affine ciphers, Vigenere cipher, and hacking programs for each of these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.

2. Mathematical Cryptology

These notes contain the central mathematical background needed for understanding modern data encryption methods, and introduce applications in cryptography and various protocols. The fledgling quantum cryptography is briefly introduced together with its backgrounds.

3. Visual Cryptography and Its Applications

Visual cryptography provides a very powerful technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed exactly together, the original secret can be discovered without computer participation.

4. Military Cryptanalysis

One of the most well-respected publications on cryptanalysis, as was written by William F. Friedman, one of the true experts in the field. Now declassified by the National Security Agency (NSA), this publication is key in helping individuals understand and solve cipher systems.

5. The Laws of Cryptography with Java Code

In this book the author is trying to find a middle ground, a gentle introduction to selected topics in cryptography without avoiding the mathematics. The material is aimed at undergraduate computer science students, but will be accessible and of interest to many others.

6. Public-Key Cryptography: Theory and Practice

This dissertation examines multiple aspects of public-key cryptography. The author covers the theory of provably secure public-key cryptography and the implementation of exponentiation and multi-exponentiation. An introduction to provable security is provided.

7. Basic Cryptanalysis

Text contains six parts: Introduction to Cryptanalysis, Monographic Substitution Systems, Polygraphic Substitution Systems, Polyalphabetic Substitution Systems, Transposition Systems, and Analysis of Code Systems. Text also contains exhaustive material to aid in the solution of cipher systems, including frequency

distributions, word and pattern tables, as well as utility tables.

8. A brief introduction of quantum cryptography for engineers

We present the fundamental principles behind quantum key distribution and discuss a few well-known QKD protocols. Bearing in mind that the majority of our readers are from engineering and experimental optics, we focus more on the experimental implementation of various QKD protocols rather than security analysis. Another important topic that is covered here is the study of the security of practical QKD systems.

9. Quantum Cryptography

Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological issues.

10. Introduction to Modern Cryptography

The viewpoint taken throughout these notes is to emphasize the theory of cryptography as it can be applied to practice. This is an approach that the authors have pursued in their research, and it seems to be a pedagogically desirable approach as well.

10 eBooks gratuitos para aprender criptografia
Reviewed by Marcos Garcia
on
janeiro 27, 2014
Rating:

## Nenhum comentário: