Cryptography

View this topic in
Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφειν, graphein, "writing", or -λογία, -logia, "study", respectively) is the practice and study of hiding information. (Wikipedia.org)






Conferences related to Cryptography

Back to Top

2018 IEEE/PES Transmission and Distribution Conference and Exposition (T&D)

Conference and Exposition covering all aspects of Transmission and Distribuiton


2017 14th IEEE India Council International Conference (INDICON)

All areas of Computer Science Engineering, Electrical Engineering, as well as Electronics and Communication Engineering.

  • 2016 IEEE Annual India Conference (INDICON)

    INDICON is a well-recognized annual conference of IEEE India Council, hosted by an IEEE Section in India. It is in the areas of Computer Science Engineering, Electrical Engineering, as well as Electronics and Communication Engineering. The 13th edition of the conference, INDICON-2016, is organized by IEEE Bangalore Section. The 2016 edition of the conference has following areas of Call for Papers. We solicit original research work/studies in the following areas in the format of paper for possible acceptance after review for presentation. 7 tracks are, 1. Computer Science2. Electronic Systems3. Energy Systems4. Humanitarian Technology5. Microwave (Antenna/Measurements/EMI/EMC/)6. Networking and Communication Engineering7. Signal and Image ProcessingYou will get about conference on www.indicon2016.in

  • 2015 Annual IEEE India Conference (INDICON)

    INDICON is a conference dedicated to Electrical & Electronics Engineering in general and hence the theme of INDICON 2015 has been chosen as E3-C3. The conference will have Research Track focusing on cutting edge research in all the 6 tracks, Energy and Power, Electrical Engineering and Environment, Electronics, Computers & Information Technology, Control & Instrumentation, and Communications. The conference also plans to have industry specific panel sessions on all the 6 tracks mentioned. Expert tutorial sessions, one each will be held on each topic. An exhibition is planned with display of industrial advances in all the fields.

  • 2014 Annual IEEE India Conference (INDICON)

    Big data and Data mining, Cloud and Ubiquitous Computing, Emerging trends in Engineering, High Performance Computing, Information and network security, Power and Energy, Software and Database System

  • 2013 Annual IEEE India Conference (INDICON)

    INDICON has been the most prestigious conference conceptualized by IEEE India Council in the field of Computer Science and Engineering, Electrical Engineering & Electronics and Communication Engineering, in general.

  • 2012 Annual IEEE India Conference (INDICON)

    The conference tries to bring out innovations in Social and Humanitarian Engineering from all disciplines of Science and Engineering.

  • 2011 Annual IEEE India Conference (INDICON)

    INDICON 2011, the flagship annual conference of IEEE India Council, is scheduled to be held in Hyderabad during 16th-18th December, 2011.The theme of the conference this year is , "Engineering Sustainable Solutions". Jointly organised by India Council and IEEE Hyderabad Section, INDICON 2011 is 2011 Annual IEEE India Conference. It is a 3-day program (1 day tutorial and 2 day conference).

  • 2010 Annual IEEE India Conference (INDICON)

    INDICON is the Annual Conference of IEEE India Council. Green awareness and suitable design approaches to achieve Green Computing, Green Communication and Green Energy are the focus of this conference. Besides this, Power and Energy Systems, Computing, and communications are included in General Category. Tutorials and Exhibitions are also included.

  • 2009 Annual IEEE India Conference (INDICON)

    INDICON has been the most prestigious conference conceptualized by IEEE India Council in the field of Computer Science and Engineering, Electrical Engineering & Electronics and Communication Engineering, in general. This conference was earlier organized with the name of Annual Conference and Exhibition (ACE). It was later renamed as INDICON in 2004 when it was organized by IEEE Kharagpur Section at IIT Kharagpur.

  • 2008 Annual IEEE India Conference (INDICON)

    IEEE India Council has been holding annual conference and Exhibition (ACE) at different locations in India. From 2004 ACE is renamed as INDICON. INDICON-2008 is being organized by IEEE Uttar Pradesh Section, jointly with IEEE India council and IIT Kanpur during 11-13 December 2008 at Indian Institute of Technology, Kanpur. Emerging fields such as distributed systems, multi-agent systems and cooperative intelligent systems are bringing exciting prospects in research.

  • 2006 Annual IEEE India Conference (INDICON)

  • 2005 Annual IEEE India Conference (INDICON)

  • 2004 Annual IEEE India Conference (INDICON)


2017 17th International Symposium on Communications and Information Technologies (ISCIT)

ISCIT will provide a forum for researchers, engineers and industry experts to exchange and discuss new ideas, recent development, and breakthroughs in IoT, communications and information technologies. Areas of interest are: Wireless Communications, Circuits and Systems, Wireless Networking and IoT, and Next-Generation Networking.


2017 19th International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2018 20th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2004 6th International Conference Advanced Communication Technology (ICACT)


2017 23rd Asia-Pacific Conference on Communications (APCC)

Since 1993, APCC has been the forum for researchers and engineers in the Asia-Pacific region to present and discuss about advanced information and communication technologies and services, while opening the door to the world at the same time.


More Conferences

Periodicals related to Cryptography

Back to Top

Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on

Methods, algorithms, and human-machine interfaces for physical and logical design, including: planning, synthesis, partitioning, modeling, simulation, layout, verification, testing, and documentation of integrated-circuit and systems designs of all complexities. Practical applications of aids resulting in producible analog, digital, optical, or microwave integrated circuits are emphasized.


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


More Periodicals


Xplore Articles related to Cryptography

Back to Top

Secure Multipath Routing Protocols in Wireless Sensor Networks: A Security Survey Analysis

Ali Modirkhazeni; Norafida Ithnin; Othman Ibrahim 2010 Second International Conference on Network Applications, Protocols and Services, 2010

Wireless Sensor Networks is usually consisting of huge number of limited sensor devices which are communicated over the wireless media. As sensor devices are limited, the networks exposed to various kinds of attacks and conventional defenses against these attacks are not suitable due to the resource constrained. Therefore, security in WSNs is a challenging task due to inheritance limitations of ...


A New Public-Key Oblivious Fragile Watermarking for Image Authentication Using Discrete Cosine Transform

Chin-Chen Chang; Henry Chou 2008 Second International Conference on Future Generation Communication and Networking Symposia, 2008

In this paper, a new oblivious fragile watermarking using discrete cosine transform is proposed. It is inspired by Wong's public key watermarking scheme proposed in 1998 and aims to improve its vulnerability towards possible attacks indicated by Barreto and Holliman. Instead of making use of contextual information and making it an inter-block dependent scheme, as suggested by Barreto, we adopt ...


Self-Authentication Mechanism with Recovery Ability for Digital Images

Yi-Hui Chen; Chih-Yang Lin; Wanutchaporn Sirakriengkrai 2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems, 2013

Nowadays, Authentication mechanism is widely applied to digital images. In this paper, we propose a self authentication mechanism with recovery ability for digital images, which is employed to protect the image during transmission over the internet. In the scheme, the image is to authenticate whether the area is modified by comparing the generated authentication code and hidden authentication code together. ...


A Lightweight Protocol for Dynamic RFID Identification

Stelvio Cimato 2008 32nd Annual IEEE International Computer Software and Applications Conference, 2008

RFID technology is widely used worldwide in a broad range of applications. Such technology however raises security concerns about the protection of the information stored in the RFID tags and exchanged during the wireless communication with the readers. In this work we propose an efficient protocol for tag identification which improves on previous proposals and provides an increased level of ...


Implementation of security mechanism in Wireless Sensor Network using Crossbow motes

Nayana Hegde; Sunilkumar S. Manvi 2014 International Conference on Advances in Electronics Computers and Communications, 2014

Security is an important concern in any wireless network. This applies to Wireless Sensor Networks (WSNs), especially those used in applications that monitor sensitive information (e.g., health care applications). However, the highly constrained nature of sensors impose a difcult challenge: their reduced availability of memory, processing power and energy hinders the deployment of many modern cryptographic algorithms considered secure. For ...


More Xplore Articles

Educational Resources on Cryptography

Back to Top

eLearning

Secure Multipath Routing Protocols in Wireless Sensor Networks: A Security Survey Analysis

Ali Modirkhazeni; Norafida Ithnin; Othman Ibrahim 2010 Second International Conference on Network Applications, Protocols and Services, 2010

Wireless Sensor Networks is usually consisting of huge number of limited sensor devices which are communicated over the wireless media. As sensor devices are limited, the networks exposed to various kinds of attacks and conventional defenses against these attacks are not suitable due to the resource constrained. Therefore, security in WSNs is a challenging task due to inheritance limitations of ...


A New Public-Key Oblivious Fragile Watermarking for Image Authentication Using Discrete Cosine Transform

Chin-Chen Chang; Henry Chou 2008 Second International Conference on Future Generation Communication and Networking Symposia, 2008

In this paper, a new oblivious fragile watermarking using discrete cosine transform is proposed. It is inspired by Wong's public key watermarking scheme proposed in 1998 and aims to improve its vulnerability towards possible attacks indicated by Barreto and Holliman. Instead of making use of contextual information and making it an inter-block dependent scheme, as suggested by Barreto, we adopt ...


Self-Authentication Mechanism with Recovery Ability for Digital Images

Yi-Hui Chen; Chih-Yang Lin; Wanutchaporn Sirakriengkrai 2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems, 2013

Nowadays, Authentication mechanism is widely applied to digital images. In this paper, we propose a self authentication mechanism with recovery ability for digital images, which is employed to protect the image during transmission over the internet. In the scheme, the image is to authenticate whether the area is modified by comparing the generated authentication code and hidden authentication code together. ...


A Lightweight Protocol for Dynamic RFID Identification

Stelvio Cimato 2008 32nd Annual IEEE International Computer Software and Applications Conference, 2008

RFID technology is widely used worldwide in a broad range of applications. Such technology however raises security concerns about the protection of the information stored in the RFID tags and exchanged during the wireless communication with the readers. In this work we propose an efficient protocol for tag identification which improves on previous proposals and provides an increased level of ...


Implementation of security mechanism in Wireless Sensor Network using Crossbow motes

Nayana Hegde; Sunilkumar S. Manvi 2014 International Conference on Advances in Electronics Computers and Communications, 2014

Security is an important concern in any wireless network. This applies to Wireless Sensor Networks (WSNs), especially those used in applications that monitor sensitive information (e.g., health care applications). However, the highly constrained nature of sensors impose a difcult challenge: their reduced availability of memory, processing power and energy hinders the deployment of many modern cryptographic algorithms considered secure. For ...


More eLearning Resources

IEEE-USA E-Books

  • Security Basics for Computer Architects

    Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support for security into all future computers and embedded computing devices and appliances. I have tried to keep the book short, which means that many interesting topics and applications could not be included. What the book focuses on are the fundamental security concepts, across different security communities, that should be understood by any computer architect trying to design or evaluate security-awar computer architectures.

  • Query Answer Authentication

    In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completeness, authenticity and minimality of the answer, as well as its freshness. We present authentication mechanisms for a wide variety of queries in the context of relational and spatial databases, text retrieval, and data streams. We also explain the cryptographic protocols from which the authentication mechanisms derive their security properties. Table of Contents: Introduction / Cryptography Foundation / Relational Queries / Spatial Queries / Text Search Queries / Data Streams / Conclusion

  • Language Methods

    This chapter discusses ways to apply four language methods: Circulation, cryptography, decoding and issuing. Circulation of material in the Testery was arranged with the help of a de-chi clerk, who kept track of material and the Supervisor, who kept track of material in the decoding room. Documents for each message worked on in the Testery were circulated in an envelope which included the Red Form (but not the tapes). When the message had been decoded, it was returned to the original room. Cryptographers in the Testery were divided into two rooms, the so-called Breakers and the so-called Setters'. The purpose of this chapter is to describe the organisation in 1945 when there were two major cryptographic commitments: (i) Recovery and solution of key from depths and Psi and motor setting from a de-chi by hand or with the help of Dragon. Possible depths noticed at Knockholt were teleprinted at once, not more than 1000 letters being sent. When the interception registers arrived, they were carefully examined and a list of other possible depths sent to Knockholt.

  • Index

    Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population. InPrivacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original--and prescient--discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy.

  • Afterword: From the Newsgroup

    Our hero is Turing, an interactive tutoring program and namesake (or virtual emanation?) of Alan Turing, World War II code breaker and father of computer science. In this unusual novel, Turing's idiosyncratic version of intellectual history from a computational point of view unfolds in tandem with the story of a love affair involving Ethel, a successful computer executive, Alexandros, a melancholy archaeologist, and Ian, a charismatic hacker. After Ethel (who shares her first name with Alan Turing's mother) abandons Alexandros following a sundrenched idyll on Corfu, Turing appears on Alexandros's computer screen to unfurl a tutorial on the history of ideas. He begins with the philosopher- mathematicians of ancient Greece -- "discourse, dialogue, argument, proof... can only thrive in an egalitarian society" -- and the Arab scholar in ninth- century Baghdad who invented algorithms; he moves on to many other topics, including cryptography and artificial intelligence, even economics and developmental biology. (These lessons are later critiqued amusingly and developed further in postings by a fictional newsgroup in the book's afterword.) As Turing's lectures progress, the lives of Alexandros, Ethel, and Ian converge in dramatic fashion, and the story takes us from Corfu to Hong Kong, from Athens to San Francisco -- and of course to the Internet, the disruptive technological and social force that emerges as the main locale and protagonist of the novel.Alternately pedagogical and romantic, Turing (A Novel about Computation) should appeal both to students and professionals who want a clear and entertaining account of the development of computation and to the general reader who enjoys novels of ideas.

  • Bibliography

    Have you ever wondered how your GPS can find the fastest way to your destination, selecting one route from seemingly countless possibilities in mere seconds? How your credit card account number is protected when you make a purchase over the Internet? The answer is algorithms. And how do these mathematical formulations translate themselves into your GPS, your laptop, or your smart phone? This book offers an engagingly written guide to the basics of computer algorithms. In Algorithms Unlocked, Thomas Cormen -- coauthor of the leading college textbook on the subject -- provides a general explanation, with limited mathematics, of how algorithms enable computers to solve problems. Readers will learn what computer algorithms are, how to describe them, and how to evaluate them. They will discover simple ways to search for information in a computer; methods for rearranging information in a computer into a prescribed order ("sorting"); how to solve basic problems that can be modeled in a computer with a mathematical structure called a "graph" (useful for modeling road networks, dependencies among tasks, and financial relationships); how to solve problems that ask questions about strings of characters such as DNA structures; the basic principles behind cryptography; fundamentals of data compression; and even that there are some problems that no one has figured out how to solve on a computer in a reasonable amount of time.

  • Acknowledgments

    Our hero is Turing, an interactive tutoring program and namesake (or virtual emanation?) of Alan Turing, World War II code breaker and father of computer science. In this unusual novel, Turing's idiosyncratic version of intellectual history from a computational point of view unfolds in tandem with the story of a love affair involving Ethel, a successful computer executive, Alexandros, a melancholy archaeologist, and Ian, a charismatic hacker. After Ethel (who shares her first name with Alan Turing's mother) abandons Alexandros following a sundrenched idyll on Corfu, Turing appears on Alexandros's computer screen to unfurl a tutorial on the history of ideas. He begins with the philosopher- mathematicians of ancient Greece -- "discourse, dialogue, argument, proof... can only thrive in an egalitarian society" -- and the Arab scholar in ninth- century Baghdad who invented algorithms; he moves on to many other topics, including cryptography and artificial intelligence, even economics and developmental biology. (These lessons are later critiqued amusingly and developed further in postings by a fictional newsgroup in the book's afterword.) As Turing's lectures progress, the lives of Alexandros, Ethel, and Ian converge in dramatic fashion, and the story takes us from Corfu to Hong Kong, from Athens to San Francisco -- and of course to the Internet, the disruptive technological and social force that emerges as the main locale and protagonist of the novel.Alternately pedagogical and romantic, Turing (A Novel about Computation) should appeal both to students and professionals who want a clear and entertaining account of the development of computation and to the general reader who enjoys novels of ideas.

  • Hubris

    Our hero is Turing, an interactive tutoring program and namesake (or virtual emanation?) of Alan Turing, World War II code breaker and father of computer science. In this unusual novel, Turing's idiosyncratic version of intellectual history from a computational point of view unfolds in tandem with the story of a love affair involving Ethel, a successful computer executive, Alexandros, a melancholy archaeologist, and Ian, a charismatic hacker. After Ethel (who shares her first name with Alan Turing's mother) abandons Alexandros following a sundrenched idyll on Corfu, Turing appears on Alexandros's computer screen to unfurl a tutorial on the history of ideas. He begins with the philosopher- mathematicians of ancient Greece -- "discourse, dialogue, argument, proof... can only thrive in an egalitarian society" -- and the Arab scholar in ninth- century Baghdad who invented algorithms; he moves on to many other topics, including cryptography and artificial intelligence, even economics and developmental biology. (These lessons are later critiqued amusingly and developed further in postings by a fictional newsgroup in the book's afterword.) As Turing's lectures progress, the lives of Alexandros, Ethel, and Ian converge in dramatic fashion, and the story takes us from Corfu to Hong Kong, from Athens to San Francisco -- and of course to the Internet, the disruptive technological and social force that emerges as the main locale and protagonist of the novel.Alternately pedagogical and romantic, Turing (A Novel about Computation) should appeal both to students and professionals who want a clear and entertaining account of the development of computation and to the general reader who enjoys novels of ideas.

  • Digital Signatures

    This chapter contains sections titled: Hash Functions Digital Signature Schemes Attacks on Digital Signatures

  • Index

    Have you ever wondered how your GPS can find the fastest way to your destination, selecting one route from seemingly countless possibilities in mere seconds? How your credit card account number is protected when you make a purchase over the Internet? The answer is algorithms. And how do these mathematical formulations translate themselves into your GPS, your laptop, or your smart phone? This book offers an engagingly written guide to the basics of computer algorithms. In Algorithms Unlocked, Thomas Cormen -- coauthor of the leading college textbook on the subject -- provides a general explanation, with limited mathematics, of how algorithms enable computers to solve problems. Readers will learn what computer algorithms are, how to describe them, and how to evaluate them. They will discover simple ways to search for information in a computer; methods for rearranging information in a computer into a prescribed order ("sorting"); how to solve basic problems that can be modeled in a computer with a mathematical structure called a "graph" (useful for modeling road networks, dependencies among tasks, and financial relationships); how to solve problems that ask questions about strings of characters such as DNA structures; the basic principles behind cryptography; fundamentals of data compression; and even that there are some problems that no one has figured out how to solve on a computer in a reasonable amount of time.



Standards related to Cryptography

Back to Top

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.


IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices

This standard specifies elements of an architecture for cryptographic protection of data on block-oriented storage devices, describing the methods, algorithms, and modes of data protection to be used.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

This standard covers specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363™-2000 and IEEE Std 1363a™-2004.1 It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key ...


IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices

Specifications of common public-key cryptographic techniques based on hard problems over lattices supplemental to those considered in IEEE 1363 and IEEE P1363a, including mathematical primitives for secret value (key) derivation, public-key encryption, identification and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is ...


More Standards