Books on cryptography have been published sporadically and with variable quality for a long time. This is despite the paradox that secrecy is of the essence...
28 KB (3,604 words) - 08:21, 14 October 2024
sonnet in which every line is an anagram of the title. Shulman, David. An Annotated Bibliography of Cryptography. New York, London: Garland Publishing Co...
4 KB (342 words) - 04:09, 5 March 2025
International Association for Cryptologic Research (redirect from Theory of Cryptography Conference)
Encryption (FSE) Public Key Cryptography (PKC) Cryptographic Hardware and Embedded Systems (CHES) Theory of Cryptography (TCC) Real World Crypto Symposium...
31 KB (1,411 words) - 12:04, 28 March 2025
United States Bibliography of cricket Books on cryptography Bibliography of Danish architecture Bibliography of encyclopedias Bibliography of encyclopedias:...
21 KB (2,240 words) - 07:45, 23 January 2025
Lattice-based cryptography is the generic term for constructions of cryptographic primitives that involve lattices, either in the construction itself...
24 KB (2,852 words) - 05:01, 2 May 2025
Theory of Secrecy Systems" is a paper published in 1949 by Claude Shannon discussing cryptography from the viewpoint of information theory. It is one of the...
6 KB (432 words) - 20:39, 13 March 2025
Cryptography was used extensively during World War II because of the importance of radio communication and the ease of radio interception. The nations...
6 KB (624 words) - 17:34, 27 February 2025
Riverbank Publications (category Cryptography books)
Methods for the Solution of Ciphers, 1918: pdf p. 72 18, Synoptic Tables for the Solution of Ciphers and A Bibliography of Cryptographic Literature, 1918: pdf...
4 KB (460 words) - 10:00, 12 July 2023
Quantum computing (redirect from Technical challenges of quantum computers)
S2CID 61401925. See also pqcrypto.org, a bibliography maintained by Daniel J. Bernstein and Tanja Lange on cryptography not known to be broken by quantum computing...
113 KB (12,420 words) - 13:17, 14 May 2025
The Code Book (redirect from The Code Book: The Evolution of Secrecy from Mary Queen of Scots to Quantum Cryptography)
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography is a book by Simon Singh, published in 1999 by Fourth Estate and Doubleday...
4 KB (397 words) - 04:38, 5 May 2025
Company, chief engineer Harold Keen. After the war, interrogation of German cryptographic personnel led to the conclusion that German cryptanalysts understood...
80 KB (10,617 words) - 05:20, 15 May 2025
Adi Shamir (category Academic staff of Weizmann Institute of Science)
contributions to cryptography include the Shamir secret sharing scheme, the breaking of the Merkle-Hellman knapsack cryptosystem, visual cryptography, and the...
11 KB (808 words) - 18:27, 27 April 2025
World War II casualties (redirect from List of World War II Casualties by Country)
of about 5 million prisoners of war. More than half of the total number of casualties are accounted for by the dead of the Republic of China and of the...
341 KB (35,896 words) - 00:38, 18 April 2025
the Levchin Prize for Real World Cryptography "for the development of AES and SHA3". He describes his development of encryption algorithms as creating...
4 KB (326 words) - 21:53, 24 August 2024
select bibliography of post-World War II English-language books (including translations) and journal articles about Stalinism and the Stalinist era of Soviet...
233 KB (27,137 words) - 05:16, 28 April 2025
The Cryptographic Quarterly is an internal, classified journal of the U.S. National Security Agency (NSA). In 2003, Michael Ravnitzky submitted a Freedom...
1 KB (89 words) - 18:21, 29 April 2024
Caesar cipher (section Bibliography)
In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code, or Caesar shift, is one of the simplest and most widely...
19 KB (2,068 words) - 02:43, 14 May 2025
Manuel Blum (category Members of the United States National Academy of Engineering)
1995 "In recognition of his contributions to the foundations of computational complexity theory and its application to cryptography and program checking"...
10 KB (715 words) - 18:18, 27 April 2025
Silvio Micali (category Members of the United States National Academy of Engineering)
Laboratory centers on cryptography and information security. In 2012, he received the Turing Award for his work in cryptography. Micali graduated in mathematics...
9 KB (637 words) - 18:41, 27 April 2025
Lars Ramkilde Knudsen (category Academic staff of the University of Bergen)
February 1962) is a Danish researcher in cryptography, particularly interested in the design and analysis of block ciphers, hash functions and message...
3 KB (251 words) - 10:15, 4 January 2025
Çetin Kaya Koç (category University of California, Santa Barbara faculty)
Çetin Kaya Koç is a cryptographic engineer, author, and academic. His research interests include cryptographic engineering, finite field arithmetic, random...
15 KB (1,340 words) - 22:08, 15 March 2025
Johannes Trithemius (redirect from Trithemius of Spanheim)
the founder of modern cryptography (a claim shared with Leon Battista Alberti) and steganography, as well as the founder of bibliography and literary...
28 KB (2,967 words) - 00:44, 25 November 2024
The Codebreakers (redirect from The Codebreakers - The Story of Secret Writing)
Story of Secret Writing (ISBN 0-684-83130-9) is a book by David Kahn, published in 1967, comprehensively chronicling the history of cryptography from ancient...
5 KB (556 words) - 04:26, 12 October 2024
Shimon Even (category Academic staff of Technion – Israel Institute of Technology)
science researcher. His main topics of interest included algorithms, graph theory and cryptography. He was a member of the Computer Science Department at...
2 KB (96 words) - 07:20, 1 February 2025
This is a timeline of declarations of war during World War II. A declaration of war is a formal act by which one nation goes to war against another. The...
52 KB (1,111 words) - 01:03, 8 May 2025
method), electronic games (e.g. for procedural generation), and cryptography. Cryptographic applications require the output not to be predictable from earlier...
28 KB (3,559 words) - 23:54, 22 February 2025
In Our Time is a radio discussion programme exploring a wide variety of historical, scientific, cultural, religious and philosophical topics, broadcast...
458 KB (296 words) - 18:18, 7 May 2025
Reference (redirect from Bibliographical reference)
observers, as in cryptography.[citation needed] References feature in many spheres of human activity and knowledge, and the term adopts shades of meaning particular...
11 KB (1,339 words) - 17:02, 23 February 2025
University Press. ISBN 978-0-8018-5730-0. Rosenheim, Shawn James (1997). The Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet. Baltimore:...
43 KB (2,232 words) - 00:07, 23 February 2025
Charles H. Bennett (physicist) (category Members of the United States National Academy of Sciences)
concept of quantum cryptography and is one of the founding fathers of modern quantum information theory (see Bennett's four laws of quantum information)...
11 KB (839 words) - 00:48, 18 March 2025