Books on cryptography have been published sporadically and with variable quality for a long time. This is despite the paradox that secrecy is of the essence...
28 KB (3,604 words) - 08:21, 14 October 2024
sonnet in which every line is an anagram of the title. Shulman, David. An Annotated Bibliography of Cryptography. New York, London: Garland Publishing Co...
4 KB (342 words) - 04:09, 5 March 2025
International Association for Cryptologic Research (redirect from Theory of Cryptography Conference)
Encryption (FSE) Public Key Cryptography (PKC) Cryptographic Hardware and Embedded Systems (CHES) Theory of Cryptography (TCC) Real World Crypto Symposium...
31 KB (1,411 words) - 12:04, 28 March 2025
Theory of Secrecy Systems" is a paper published in 1949 by Claude Shannon discussing cryptography from the viewpoint of information theory. It is one of the...
6 KB (432 words) - 20:39, 13 March 2025
Riverbank Publications (category Cryptography books)
Methods for the Solution of Ciphers, 1918: pdf p. 72 18, Synoptic Tables for the Solution of Ciphers and A Bibliography of Cryptographic Literature, 1918: pdf...
4 KB (460 words) - 10:00, 12 July 2023
Lattice-based cryptography is the generic term for constructions of cryptographic primitives that involve lattices, either in the construction itself...
24 KB (2,852 words) - 05:01, 2 May 2025
United States Bibliography of cricket Books on cryptography Bibliography of Danish architecture Bibliography of encyclopedias Bibliography of encyclopedias:...
21 KB (2,240 words) - 07:45, 23 January 2025
Cryptography was used extensively during World War II because of the importance of radio communication and the ease of radio interception. The nations...
6 KB (624 words) - 17:34, 27 February 2025
The Cryptographic Quarterly is an internal, classified journal of the U.S. National Security Agency (NSA). In 2003, Michael Ravnitzky submitted a Freedom...
1 KB (89 words) - 18:21, 29 April 2024
The Code Book (redirect from The Code Book: The Evolution of Secrecy from Mary Queen of Scots to Quantum Cryptography)
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography is a book by Simon Singh, published in 1999 by Fourth Estate and Doubleday...
4 KB (397 words) - 04:38, 5 May 2025
The Codebreakers (redirect from The Codebreakers - The Story of Secret Writing)
Story of Secret Writing (ISBN 0-684-83130-9) is a book by David Kahn, published in 1967, comprehensively chronicling the history of cryptography from ancient...
5 KB (556 words) - 04:26, 12 October 2024
Quantum computing (redirect from Technical challenges of quantum computers)
S2CID 61401925. See also pqcrypto.org, a bibliography maintained by Daniel J. Bernstein and Tanja Lange on cryptography not known to be broken by quantum computing...
113 KB (12,419 words) - 13:17, 14 May 2025
the Levchin Prize for Real World Cryptography "for the development of AES and SHA3". He describes his development of encryption algorithms as creating...
4 KB (326 words) - 21:53, 24 August 2024
World War II casualties (redirect from List of World War II Casualties by Country)
of about 5 million prisoners of war. More than half of the total number of casualties are accounted for by the dead of the Republic of China and of the...
341 KB (35,896 words) - 00:38, 18 April 2025
Victor Shoup (category University of Wisconsin–Madison College of Letters and Science alumni)
professor at the Courant Institute of Mathematical Sciences at New York University, focusing on algorithm and cryptography courses. He is currently a Principal...
4 KB (297 words) - 00:46, 18 March 2025
Silvio Micali (category Members of the United States National Academy of Engineering)
Laboratory centers on cryptography and information security. In 2012, he received the Turing Award for his work in cryptography. Micali graduated in mathematics...
9 KB (637 words) - 18:41, 27 April 2025
Johannes Trithemius (redirect from Trithemius of Spanheim)
the founder of modern cryptography (a claim shared with Leon Battista Alberti) and steganography, as well as the founder of bibliography and literary...
28 KB (2,967 words) - 00:44, 25 November 2024
Adi Shamir (category Academic staff of Weizmann Institute of Science)
contributions to cryptography include the Shamir secret sharing scheme, the breaking of the Merkle-Hellman knapsack cryptosystem, visual cryptography, and the...
11 KB (808 words) - 18:27, 27 April 2025
Michael Ben-Or (category Academic staff of the Hebrew University of Jerusalem)
Fault-Tolerance, Cryptography and Quantum Computation. He received his PhD in Mathematics from the Hebrew University in 1982. Three of his papers received...
2 KB (230 words) - 10:47, 9 May 2025
Charles H. Bennett (physicist) (category Members of the United States National Academy of Sciences)
concept of quantum cryptography and is one of the founding fathers of modern quantum information theory (see Bennett's four laws of quantum information)...
11 KB (839 words) - 00:48, 18 March 2025
Caesar cipher (section Bibliography)
In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code, or Caesar shift, is one of the simplest and most widely...
19 KB (2,068 words) - 02:43, 14 May 2025
in the Department of Computer Science at Bar-Ilan University where he conducts research on cryptography with a focus on the theory of secure computation...
9 KB (963 words) - 20:24, 15 January 2025
Lars Ramkilde Knudsen (category Academic staff of the University of Bergen)
February 1962) is a Danish researcher in cryptography, particularly interested in the design and analysis of block ciphers, hash functions and message...
3 KB (251 words) - 10:15, 4 January 2025
William F. Friedman (category American people of Moldovan-Jewish descent)
name was changed to William. As a child, Friedman was introduced to cryptography in the short story "The Gold-Bug" by Edgar Allan Poe. He studied at the...
26 KB (2,834 words) - 12:55, 18 April 2025
select bibliography of post-World War II English-language books (including translations) and journal articles about Stalinism and the Stalinist era of Soviet...
233 KB (27,137 words) - 05:16, 28 April 2025
Shimon Even (category Academic staff of Technion – Israel Institute of Technology)
science researcher. His main topics of interest included algorithms, graph theory and cryptography. He was a member of the Computer Science Department at...
2 KB (96 words) - 07:20, 1 February 2025
Manuel Blum (category Members of the United States National Academy of Engineering)
1995 "In recognition of his contributions to the foundations of computational complexity theory and its application to cryptography and program checking"...
10 KB (715 words) - 18:18, 27 April 2025
In Our Time is a radio discussion programme exploring a wide variety of historical, scientific, cultural, religious and philosophical topics, broadcast...
458 KB (296 words) - 12:02, 15 May 2025
Çetin Kaya Koç (category University of California, Santa Barbara faculty)
Çetin Kaya Koç is a cryptographic engineer, author, and academic. His research interests include cryptographic engineering, finite field arithmetic, random...
15 KB (1,340 words) - 22:08, 15 March 2025
Eastern Front (World War II) (redirect from Eastern Front of World War II)
states, and the German–Soviet War in modern Germany and Ukraine, was a theatre of World War II fought between the European Axis powers and Allies, including...
213 KB (23,112 words) - 13:40, 17 May 2025