Sign up for offers & news
Enter your email address to receive news and special offers.
By Keith Martin
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for various technologies.
Unsolved!: The History and Mystery of the World\'s Greatest Ciphers from Ancient Egypt to Online Secret Societies
"In 1953, a man was found dead from cyanide poisoning near the Philadelphia airport with a picture of a Nazi aircraft in his wallet. Taped to his abdomen was an enciphered message. In 1912, a book dealer named Wilfrid Voynich came into possession of an illuminated cipher manuscript once belonging...
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or bank transactions. Joshua Holden instead shows...
Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis.
Breaking Teleprinter Ciphers at Bletchley Park: An edition of I.J. Good, D. Michie and G. Timms: General Report on Tunny with Emphasis on Statistical Methods (1945)
This is a critical, learned edition of the General Report on Tunny with Emphasis on Statistical Methods aka The Newmanry Report, prepared in 1945 and declassified in 2000. The Report was a technical account of what the team of cryptanalysts did in their work at Bletchley Park during WWII.
The book discusses modern channel coding techniques for wireless communications such as turbo codes, low parity check codes LDPC, space-time coding, Reed Solomon RS codes and convolutional codes.
Advances in Cryptology -- EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013, Proceedings
This book constitutes the proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2013, held in Athens, Greece, in May 2013.
This brief focuses on radio resource allocation in a heterogeneous wireless medium. In the proposed solutions, mobile terminals play an active role in the resource allocation operation, instead of their traditional role as passive service recipients in the networking environment.