-
1
Cryptanalysis; a study of ciphers and their solution.
New York, Dover Publications 1956Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
2
Algorithmic cryptanalysis /
Boca Raton : CRC Press, 2009Table of Contents: “…A bird's-eye view of modern cryptography -- Elementary number theory and algebra background -- Linear algebra -- Sieve algorithms -- Brute force cryptanalysis -- The birthday paradox : sorting or not? …”
Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
3
Applied cryptanalysis : breaking ciphers in the real world /
Hoboken, N.J. : Wiley-Interscience, 2007Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
4
Modern cryptanalysis : techniques for advanced code breaking /
Indianapolis, IN : Wiley Pub., 2008Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
5
Elementary cryptanalysis.
Boston : American photographic publishing co., 1939Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
6
Elementary cryptanalysis : a mathematical approach /
Washington : Mathematical Association of America, 1966“…Computer programs to accompany Abraham Sinkov's Elementary cryptanalysis.…”
Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
7
Elementary cryptanalysis : a mathematical approach /
Washington : Mathematical Association of America, 1966Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
8
Elementary cryptanalysis ; a mathematical approach.
[New York] : Random House, 1968Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
9
Cryptanalysis for microcomputers /
Rochelle Park, N.J. : Hayden Book Co., 1982Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
10
Elementary cryptanalysis : a mathematical approach /
[Washington, D.C.] : Mathematical Association of America, 2009
2nd ed. /Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
11
History of cryptography and cryptanalysis : codes, ciphers, and their algorithms /
Cham, Switzerland : Springer, 2018“…History of cryptography and cryptanalysis…”
Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
12
Cryptanalysis of RSA and its variants /
Boca Raton : CRC Press, 2010Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
13
Machine cryptography and modern cryptanalysis /
Dedham, MA : Artech House, 1985Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
14
Cryptanalysis of number theoretic ciphers /
Boca Raton, FL : CRC Press/Chapman & Hall, 2003Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
15
Cryptanalysis of number theoretic ciphers /
Boca Raton, FL : Chapman & Hall/CRC, 2003Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
16
Cryptanalysis of DES and Hash algorithms /
Format: Thesis Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
17
Differential cryptanalysis of the data encryption standard /
New York : Springer-Verlag, 1993Table of Contents: “…Introduction to Differential Cryptanalysis -- 4. Differential Cryptanalysis of DES Variants -- 5. …”
Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
18
Mathematical ciphers : from Caesar to RSA
Providence, R.I. : American Mathematical Society, 2006Table of Contents:Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
19
Cryptographic hardware and embedded system, CHES 2003 : 5th international workshop, Cologne, Germany, September 8-10, 2003 : proceedings
Berlin ; New York : Springer-Verlag, 2003Table of Contents: “…Hidden Markov Model Cryptanalysis /…”
Format: Conference Proceeding Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
20
The twofish encryption algorithm : a 128-bit block cipher
New York : John Wiley & Sons, Inc., 1999Table of Contents: “…Introduction -- Twofish Design Goals -- Twofish Building Blocks -- Twofish -- Performance of Twofish -- Twofish Design Philosophy -- The Design of Twofish -- Design of the Twofish Key Schedule -- Cryptanalysis of Twofish -- Using Twofish -- Historical Remarks -- Conclusions and Further Work -- Twofish Test Vectors -- Code.…”
Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?>