• Thumbnail for Bibliography of cryptography
    Books on cryptography have been published sporadically and with variable quality for a long time. This is despite the paradox that secrecy is of the essence...
    28 KB (3,604 words) - 08:21, 14 October 2024
  • sonnet in which every line is an anagram of the title. Shulman, David. An Annotated Bibliography of Cryptography. New York, London: Garland Publishing Co...
    4 KB (342 words) - 04:09, 5 March 2025
  • Encryption (FSE) Public Key Cryptography (PKC) Cryptographic Hardware and Embedded Systems (CHES) Theory of Cryptography (TCC) Real World Crypto Symposium...
    31 KB (1,411 words) - 12:04, 28 March 2025
  • United States Bibliography of cricket Books on cryptography Bibliography of Danish architecture Bibliography of encyclopedias Bibliography of encyclopedias:...
    21 KB (2,240 words) - 07:45, 23 January 2025
  • Lattice-based cryptography is the generic term for constructions of cryptographic primitives that involve lattices, either in the construction itself...
    24 KB (2,852 words) - 05:01, 2 May 2025
  • Theory of Secrecy Systems" is a paper published in 1949 by Claude Shannon discussing cryptography from the viewpoint of information theory. It is one of the...
    6 KB (432 words) - 20:39, 13 March 2025
  • Cryptography was used extensively during World War II because of the importance of radio communication and the ease of radio interception. The nations...
    6 KB (624 words) - 17:34, 27 February 2025
  • Thumbnail for Riverbank Publications
    Riverbank Publications (category Cryptography books)
    Methods for the Solution of Ciphers, 1918: pdf p. 72  18, Synoptic Tables for the Solution of Ciphers and A Bibliography of Cryptographic Literature, 1918: pdf...
    4 KB (460 words) - 10:00, 12 July 2023
  • Thumbnail for Quantum computing
    S2CID 61401925. See also pqcrypto.org, a bibliography maintained by Daniel J. Bernstein and Tanja Lange on cryptography not known to be broken by quantum computing...
    113 KB (12,420 words) - 13:17, 14 May 2025
  • The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography is a book by Simon Singh, published in 1999 by Fourth Estate and Doubleday...
    4 KB (397 words) - 04:38, 5 May 2025
  • Thumbnail for Ultra (cryptography)
    Company, chief engineer Harold Keen. After the war, interrogation of German cryptographic personnel led to the conclusion that German cryptanalysts understood...
    80 KB (10,617 words) - 05:20, 15 May 2025
  • Thumbnail for Adi Shamir
    Adi Shamir (category Academic staff of Weizmann Institute of Science)
    contributions to cryptography include the Shamir secret sharing scheme, the breaking of the Merkle-Hellman knapsack cryptosystem, visual cryptography, and the...
    11 KB (808 words) - 18:27, 27 April 2025
  • Thumbnail for World War II casualties
    of about 5 million prisoners of war. More than half of the total number of casualties are accounted for by the dead of the Republic of China and of the...
    341 KB (35,896 words) - 00:38, 18 April 2025
  • the Levchin Prize for Real World Cryptography "for the development of AES and SHA3". He describes his development of encryption algorithms as creating...
    4 KB (326 words) - 21:53, 24 August 2024
  • select bibliography of post-World War II English-language books (including translations) and journal articles about Stalinism and the Stalinist era of Soviet...
    233 KB (27,137 words) - 05:16, 28 April 2025
  • The Cryptographic Quarterly is an internal, classified journal of the U.S. National Security Agency (NSA). In 2003, Michael Ravnitzky submitted a Freedom...
    1 KB (89 words) - 18:21, 29 April 2024
  • Thumbnail for Caesar cipher
    In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code, or Caesar shift, is one of the simplest and most widely...
    19 KB (2,068 words) - 02:43, 14 May 2025
  • Thumbnail for Manuel Blum
    Manuel Blum (category Members of the United States National Academy of Engineering)
    1995 "In recognition of his contributions to the foundations of computational complexity theory and its application to cryptography and program checking"...
    10 KB (715 words) - 18:18, 27 April 2025
  • Thumbnail for Silvio Micali
    Silvio Micali (category Members of the United States National Academy of Engineering)
    Laboratory centers on cryptography and information security. In 2012, he received the Turing Award for his work in cryptography. Micali graduated in mathematics...
    9 KB (637 words) - 18:41, 27 April 2025
  • Lars Ramkilde Knudsen (category Academic staff of the University of Bergen)
    February 1962) is a Danish researcher in cryptography, particularly interested in the design and analysis of block ciphers, hash functions and message...
    3 KB (251 words) - 10:15, 4 January 2025
  • Thumbnail for Çetin Kaya Koç
    Çetin Kaya Koç (category University of California, Santa Barbara faculty)
    Çetin Kaya Koç is a cryptographic engineer, author, and academic. His research interests include cryptographic engineering, finite field arithmetic, random...
    15 KB (1,340 words) - 22:08, 15 March 2025
  • Thumbnail for Johannes Trithemius
    the founder of modern cryptography (a claim shared with Leon Battista Alberti) and steganography, as well as the founder of bibliography and literary...
    28 KB (2,967 words) - 00:44, 25 November 2024
  • Thumbnail for The Codebreakers
    Story of Secret Writing (ISBN 0-684-83130-9) is a book by David Kahn, published in 1967, comprehensively chronicling the history of cryptography from ancient...
    5 KB (556 words) - 04:26, 12 October 2024
  • Thumbnail for Shimon Even
    Shimon Even (category Academic staff of Technion – Israel Institute of Technology)
    science researcher. His main topics of interest included algorithms, graph theory and cryptography. He was a member of the Computer Science Department at...
    2 KB (96 words) - 07:20, 1 February 2025
  • Thumbnail for Declarations of war during World War II
    This is a timeline of declarations of war during World War II. A declaration of war is a formal act by which one nation goes to war against another. The...
    52 KB (1,111 words) - 01:03, 8 May 2025
  • method), electronic games (e.g. for procedural generation), and cryptography. Cryptographic applications require the output not to be predictable from earlier...
    28 KB (3,559 words) - 23:54, 22 February 2025
  • In Our Time is a radio discussion programme exploring a wide variety of historical, scientific, cultural, religious and philosophical topics, broadcast...
    458 KB (296 words) - 18:18, 7 May 2025
  • observers, as in cryptography.[citation needed] References feature in many spheres of human activity and knowledge, and the term adopts shades of meaning particular...
    11 KB (1,339 words) - 17:02, 23 February 2025
  • Thumbnail for Edgar Allan Poe bibliography
    University Press. ISBN 978-0-8018-5730-0. Rosenheim, Shawn James (1997). The Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet. Baltimore:...
    43 KB (2,232 words) - 00:07, 23 February 2025
  • Thumbnail for Charles H. Bennett (physicist)
    Charles H. Bennett (physicist) (category Members of the United States National Academy of Sciences)
    concept of quantum cryptography and is one of the founding fathers of modern quantum information theory (see Bennett's four laws of quantum information)...
    11 KB (839 words) - 00:48, 18 March 2025