Proceedings, American Philosophical Society (vol. 106, no. 1, 1962)
Author :
Publisher : American Philosophical Society
Page : 104 pages
File Size : 16,65 MB
Release :
Category :
ISBN : 9781422371817
Author :
Publisher : American Philosophical Society
Page : 104 pages
File Size : 16,65 MB
Release :
Category :
ISBN : 9781422371817
Author :
Publisher : American Philosophical Society
Page : 88 pages
File Size : 35,66 MB
Release :
Category :
ISBN : 9781422371862
Author :
Publisher : American Philosophical Society
Page : 110 pages
File Size : 25,77 MB
Release :
Category :
ISBN : 9781422371848
Author :
Publisher : American Philosophical Society
Page : 82 pages
File Size : 26,30 MB
Release :
Category :
ISBN : 9781422371824
Author :
Publisher : American Philosophical Society
Page : 84 pages
File Size : 26,28 MB
Release :
Category :
ISBN : 9781422371855
Author :
Publisher : American Philosophical Society
Page : 142 pages
File Size : 35,5 MB
Release :
Category :
ISBN : 9781422371831
Author :
Publisher : American Philosophical Society
Page : 106 pages
File Size : 14,86 MB
Release :
Category :
ISBN : 9781422371398
Author : Campbell Grant
Publisher : Univ of California Press
Page : 212 pages
File Size : 42,74 MB
Release : 1965
Category : California
ISBN :
Author : Aitor Goti
Publisher : BoD – Books on Demand
Page : 342 pages
File Size : 40,74 MB
Release : 2010-08-18
Category : Computers
ISBN : 953307115X
Considered by many authors as a technique for modelling stochastic, dynamic and discretely evolving systems, this technique has gained widespread acceptance among the practitioners who want to represent and improve complex systems. Since DES is a technique applied in incredibly different areas, this book reflects many different points of view about DES, thus, all authors describe how it is understood and applied within their context of work, providing an extensive understanding of what DES is. It can be said that the name of the book itself reflects the plurality that these points of view represent. The book embraces a number of topics covering theory, methods and applications to a wide range of sectors and problem areas that have been categorised into five groups. As well as the previously explained variety of points of view concerning DES, there is one additional thing to remark about this book: its richness when talking about actual data or actual data based analysis. When most academic areas are lacking application cases, roughly the half part of the chapters included in this book deal with actual problems or at least are based on actual data. Thus, the editor firmly believes that this book will be interesting for both beginners and practitioners in the area of DES.
Author : Craig Bauer
Publisher : CRC Press
Page : 775 pages
File Size : 38,40 MB
Release : 2021-04-20
Category : Computers
ISBN : 1351668498
The first edition of this award-winning book attracted a wide audience. This second edition is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the mathematics can be prioritized, with a book both students and instructors will enjoy reading. Secret History: The Story of Cryptology, Second Edition incorporates new material concerning various eras in the long history of cryptology. Much has happened concerning the political aspects of cryptology since the first edition appeared. The still unfolding story is updated here. The first edition of this book contained chapters devoted to the cracking of German and Japanese systems during World War II. Now the other side of this cipher war is also told, that is, how the United States was able to come up with systems that were never broken. The text is in two parts. Part I presents classic cryptology from ancient times through World War II. Part II examines modern computer cryptology. With numerous real-world examples and extensive references, the author skillfully balances the history with mathematical details, providing readers with a sound foundation in this dynamic field. FEATURES Presents a chronological development of key concepts Includes the Vigenère cipher, the one-time pad, transposition ciphers, Jefferson’s wheel cipher, Playfair cipher, ADFGX, matrix encryption, Enigma, Purple, and other classic methods Looks at the work of Claude Shannon, the origin of the National Security Agency, elliptic curve cryptography, the Data Encryption Standard, the Advanced Encryption Standard, public-key cryptography, and many other topics New chapters detail SIGABA and SIGSALY, successful systems used during World War II for text and speech, respectively Includes quantum cryptography and the impact of quantum computers