About the Book
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 135. Chapters: Assassination market, Dining cryptographers protocol, Yarrow algorithm, International Association for Cryptologic Research, Type 1 product, Type 2 product, Journal of Cryptology, KY-57, Cryptology ePrint Archive, Random function, CryptoStick, Passive attack, Impossible differential cryptanalysis, Keccak, Integral cryptanalysis, Newmanry, PBKDF2, MQV, COCONUT98, BLAKE, Shrinking generator, Standard Model, Certification path validation algorithm, DFC, Gilles Brassard, Perfect forward secrecy, Authenticated encryption, MULTI2, Partitioning cryptanalysis, Truncated differential cryptanalysis, Crypto-1, Hierocrypt, Nicolas Courtois, David Chaum, Central Security Service, Michael Luby, MD6, Akelarre, Xmx, Polish Enigma doubles, SEED, Certicom, Post-quantum cryptography, Internet Security Association and Key Management Protocol, Eli Biham, Henryk Zygalski, Idea NXT, Interpolation attack, Distance-bounding protocol, Brian Tovey, Generic group model, CCMP, James Massey, Distinguishing attack, MDS matrix, Hut 6, MDC-2, SXAL/MBAL, Filesystem-level encryption, Security protocol notation, Anubis, Grostl, Rambutan, Enigform, Bouncy Castle, Bcrypt, Rabin fingerprint, Nigel de Grey, BassOmatic, GBDE, Cryptography Research, Zooko's triangle, Intermediate certificate authorities, Crab, Cryptoloop, Fill device, Petname, Tcpcrypt, Confusion and diffusion, FEA-M, Polyinstantiation, C2Net, Bart Preneel, Doug Stinson, BATON, Yahalom, Arthur Bonsall, Secure two-party computation, Key generation, CIPHERUNICORN-E, Null cipher, United States Special Collections Service, ABC, ISO/IEC 18014, Secure Communication based on Quantum Cryptography, Visual cryptography, MultiSwap, Variably Modified Permutation Composition, CIKS-1, Card catalog, Edward Travis, Decorrelation theory, On-the-fly encryption, Merkle's Puzzles, Schoof-Elkies-Atkin algorithm...