Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
116
result(s) for
"Cryptographie."
Sort by:
The hidden history of code-breaking : the secret world of cyphers, uncrackable codes, and elusive encryptions
by
McKay, Sinclair, author
in
Ciphers History.
,
Cryptography History.
,
Chiffres (Cryptographie) Histoire.
2023
A fascinating exploration of the uncrackable codes and secret cyphers that helped win wars, spark revolutions and change the faces of nations.
Quantum Computing
by
Sciences, Division on Engineering and Physical
,
Board, Intelligence Community Studies
,
National Academies of Sciences, Engineering, and Medicine
in
Cryptography
,
Quantum computing
2019
Quantum mechanics, the subfield of physics that describes the behavior of very small (quantum) particles, provides the basis for a new paradigm of computing. First proposed in the 1980s as a way to improve computational modeling of quantum systems, the field of quantum computing has recently garnered significant attention due to progress in building small-scale devices. However, significant technical advances will be required before a large-scale, practical quantum computer can be achieved.
Quantum Computing: Progress and Prospects provides an introduction to the field, including the unique characteristics and constraints of the technology, and assesses the feasibility and implications of creating a functional quantum computer capable of addressing real-world problems. This report considers hardware and software requirements, quantum algorithms, drivers of advances in quantum computing and quantum devices, benchmarks associated with relevant use cases, the time and resources required, and how to assess the probability of success.
Hands-On Cryptography with Python
by
Bowne, Samuel
in
COMPUTERS / Security / General
,
Cryptography
,
Data encryption (Computer science)
2018,2024
Cryptography is essential to protect sensitive information, but it is often performed inadequately or incorrectly. This book will show how to encrypt, evaluate, compare, and attack your data using Python. Overall, the book will help you deal with the common errors in encryption and would know how to exploit them.
Applied Cryptography for Researchers and Practitioners
by
Pranav, Prashant
in
Cryptography
2023
The book will introduce readers to the broader concept of cryptography and its allied areas. Introduction to various cryptographic protocols such as symmetric and asymmetric encryption algorithms are provided in this book. New techniques such as blockchain and lightweight cryptography are also discussed in this book. The book additionally focuses on the musical cryptography concept and many new algorithms to secure communication are shown to be achieved using Indian music. Integer factorization is also discussed in this book with a plausible algorithm to break it in polynomial time. The book should be found useful to advanced undergraduate and post-graduate students, researchers and practitioners of computing science.
Asymmetric cryptography : primitives and protocols
\"Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what \"secure\" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange. After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation.\"-- Page 4 of cover.
Cryptomonnaie. La comptabilité des Masternodes
2019
Au cours des dernières années, le monde des cryptomonnaies a vu son lexique, déjà bien fourni, s'enrichir de trois nouveaux termes : Stacking, Proof of Stack et Masternode. Si ces expressions ne vous parlent pas ou peu, il est important de les comprendre pour saisir le changement intervenu dans le monde des cryptomonnaies et leur enjeu économique. Détails. Pas de chiffres.
Journal Article
Codename Nemo : the hunt for a Nazi U-boat and the elusive Enigma machine
On June 4, 1944, the course of World War II was forever changed. That day, a US Navy task force achieved the impossible--capturing German U-boat U-505. Called Operation Nemo, it was the first seizure of an enemy ship in battle since the War of 1812, one of the greatest achievements of the US Navy and a victory that shortened the duration of the war.
Learning and Experiencing Cryptography with CrypTool and SageMath
2023,2024
This book provides a broad overview of cryptography and enables cryptography for trying out. It emphasizes the connections between theory and practice, focuses on RSA for introducing number theory and PKI, and links the theory to the most current recommendations from NIST and BSI. The book also enables readers to directly try out the results with existing tools available as open source. It is different from all existing books because it shows very concretely how to execute many procedures with different tools. The target group could be self-learners, pupils and students, but also developers and users in companies. All code written with these open-source tools is available. The appendix describes in detail how to use these tools. The main chapters are independent from one another. At the end of most chapters, you will find references and web links. The sections have been enriched with many footnotes. Within the footnotes you can see where the described functions can be called and tried within the different CrypTool versions, within SageMath or within OpenSSL.