This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Bibliography of cryptography" – news · newspapers · books · scholar · JSTOR(January 2017) (Learn how and when to remove this message)
Johannes Trithemius' Polygraphiae (1518) is the first printed book on cryptology.
Books on cryptography have been published sporadically and with highly variable quality for a long time. This is despite the tempting, though superficial, paradox that secrecy is of the essence in sending confidential messages – see Kerckhoffs' principle.
In contrast, the revolutions in cryptography and secure communications since the 1970s are well covered in the available literature.
and 26 Related for: Bibliography of cryptography information
that secrecy is of the essence in sending confidential messages – see Kerckhoffs' principle. In contrast, the revolutions in cryptography and secure communications...
Encryption (FSE) Public Key Cryptography (PKC) Cryptographic Hardware and Embedded Systems (CHES) Theory ofCryptography (TCC) Real World Crypto Symposium...
sonnet in which every line is an anagram of the title. Shulman, David. An Annotated BibliographyofCryptography. New York, London: Garland Publishing Co...
University Press. ISBN 978-0-8018-5730-0. Rosenheim, Shawn James (1997). The Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet. Baltimore:...
Cryptography was used extensively during World War II because of the importance of radio communication and the ease of radio interception. The nations...
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography is a book by Simon Singh, published in 1999 by Fourth Estate and Doubleday...
ofCryptography since Shannon". Handbook of Formal Analysis and Verification in Cryptography. A Mathematical Theory ofCryptographyBibliographyof Claude...
a bibliographyof works on World War II. The bibliography aims to include primary, secondary and tertiary sources regarding the European theatre of World...
United States Bibliographyof cricket Books on cryptographyBibliographyof Danish architecture Bibliographyof encyclopedias Bibliographyof encyclopedias:...
contributions to cryptography include the Shamir secret sharing scheme, the breaking of the Merkle-Hellman knapsack cryptosystem, visual cryptography, and the...
S2CID 61401925. See also pqcrypto.org, a bibliography maintained by Daniel J. Bernstein and Tanja Lange on cryptography not known to be broken by quantum computing...
observers, as in cryptography.[citation needed] References feature in many spheres of human activity and knowledge, and the term adopts shades of meaning particular...
select bibliographyof post-World War II English-language books (including translations) and journal articles about Stalinism and the Stalinist era of Soviet...
Laboratory centers on cryptography and information security. In 2012, he received the Turing Award for his work in cryptography. Micali graduated in mathematics...
This is a selected bibliography and other resources for The Holocaust, including prominent primary sources, historical studies, notable survivor accounts...
ISBN 978-3941866027 Bibliographyof Canadian military history Bibliographyof United States military history List ofbibliographies on American history Causes of World...
In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code, or Caesar shift, is one of the simplest and most widely...
theory of computation concerns abstract models of computation and general classes of problems that can be solved using them. The fields ofcryptography and...
Methods for the Solution of Ciphers, 1918: pdf p. 72 18, Synoptic Tables for the Solution of Ciphers and A BibliographyofCryptographic Literature, 1918: pdf...
Stephenson's work explores mathematics, cryptography, linguistics, philosophy, currency, and the history of science. He also writes non-fiction articles...
science researcher. His main topics of interest included algorithms, graph theory and cryptography. He was a member of the Computer Science Department at...
the Levchin Prize for Real World Cryptography "for the development of AES and SHA3". He describes his development of encryption algorithms as creating...
February 1962) is a Danish researcher in cryptography, particularly interested in the design and analysis of block ciphers, hash functions and message...
is a secure communication method that implements a cryptographic protocol involving components of quantum mechanics. It enables two parties to produce...
interests include complexity theory, parallel algorithms, graph theory, cryptography, distributed computing, and neural networks. Wigderson received the Abel...
of his fundamental contributions to the theory of computation, including the complexity-based theory of pseudorandom number generation, cryptography,...