Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
13
result(s) for
"Chiffres (Cryptographie)"
Sort by:
The hidden history of code-breaking : the secret world of cyphers, uncrackable codes, and elusive encryptions
A fascinating exploration of the uncrackable codes and secret cyphers that helped win wars, spark revolutions and change the faces of nations.
Hands-On Cryptography with Python
by
Bowne, Samuel
in
COM053000 COMPUTERS / Security / General
,
COMPUTERS / Security / Cryptography
,
COMPUTERS / Security / Networking
2018
Cryptography is essential to protect sensitive information, but it is often performed inadequately or incorrectly. This book will show how to encrypt, evaluate, compare, and attack your data using Python. Overall, the book will help you deal with the common errors in encryption and would know how to exploit them.
Mathematical Recreations and Essays
1974
For over eighty years this delightful classic has provided entertainment through mathematical problems commonly known as recreations. This new edition upholds the original, but the terminology and treatment of problems have been updated and much new material has been added.
Advanced Linear Cryptanalysis of Block and Stream Ciphers
2011
The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. Since its invention, several theoretical and practical aspects of the technique have been studied, understood and generalized, resulting in more elaborated attacks against certain ciphers, but also in some negative results regarding the potential of various attempts at generalization. This book gives an overview of the current state of the discipline, as well as taking a look at potential future developments, and is divided into five parts. The first part deals with basic assumptions in linear cryptanalysis and their consequences for the design of modern block ciphers; part two explores a theory of multi-dimensional linear attacks on block ciphers; the third part covers how linear attacks can be applied to stream ciphers, and gives an overview of the development of linear attacks as well as a theoretical explanation of their current use. Part four details interesting and useful links between linear cryptanalysis and coding theory, and the fifth and final part discusses how correlation analysis can be conducted at the level of elements of GF (2n) without the need to deal with field representation issues. This book will be of interest to anybody who wishes to explore this fascinating yet complex part of symmetrical cryptanalysis.
Security of Block Ciphers
2015,2016
A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysis
* Written by authors known within the academic cryptography community, this book presents the latest developments in current research
* Unique in its combination of both algorithmic-level design and hardware-level implementation; this all-round approach - algorithm to implementation – covers security from start to completion
* Deals with AES (Advanced Encryption standard), one of the most used symmetric-key ciphers, which helps the reader to learn the fundamental theory of cryptanalysis and practical applications of side-channel analysis
Elementary Cryptanalysis
2009
Originally published in the New Mathematical Library almost half a century ago, this charming book explains how to solve cryptograms based on elementary mathematical principles, starting with the Caesar cipher and building up to progressively more sophisticated substitution methods. Todd Feil has updated the book for the technological age by adding two new chapters covering RSA public-key cryptography, one-time pads, and pseudo-random-number generators. Exercises are given throughout the text that will help the reader understand the concepts and practice the techniques presented. Software to ease the drudgery of making the necessary calculations is made available. The book assumes minimal mathematical prerequisites and therefore explains from scratch such concepts as summation notation, matrix multiplication, and modular arithmetic. Even the mathematically sophisticated reader, however, will find some of the exercises challenging. (Answers to the exercises appear in an appendix.)
Secret language
2010
This book is about language designed to mean what it does not seem to mean. Ciphers and codes conceal messages and protect secrets. Symbol and magic hide meanings to imperil or delight. Languages made to baffle and confuse let insiders talk openly without being understood by those beyond the circle. Barry Blake looks in depth at these and many more. He explores the history and uses of the slangs and argots of schools and trades. He traces the histories of centuries-old cants such as those used by sailors and criminals, among them polari, the mix of Italian, Yiddish, and slang spoken once among strolling players and circus folk and then taken up by groups in London. He examines the sacred languages of ancient cults and religions, uncovers the workings of onomancy, spells, and gematria, considers the obliqueness of allusion and parody, and celebrates the absurdities of euphemism and jargon. Secret Language takes the reader on fascinating excursions down obscure byways of language, ranging across time and culture. With revelations on every page it will entertain everyone with an urge to know more about the most arcane and curious uses of language.
Codes and Ciphers
2001,2002
The design of code and cipher systems has undergone major changes in modern times. Powerful personal computers have resulted in an explosion of e-banking, e-commerce and e-mail, and as a consequence the encryption of communications to ensure security has become a matter of public interest and importance. This book describes and analyses many cipher systems ranging from the earliest and elementary to the more recent and sophisticated, such as RSA and DES, as well as wartime machines such as the ENIGMA and Hagelin, and ciphers used by spies. Security issues and possible methods of attack are discussed and illustrated by examples. The design of many systems involves advanced mathematical concepts and this is explained in detail in a major appendix. This book will appeal to anyone interested in codes and ciphers as used by private individuals, spies, governments and industry throughout history.