Subcategories
https://app.wirexapp.com/join/yzI_PsT5s0qxs8JlGcfEpw Secure solutions for your digital money

Bitcoin Wallet | Payment Card | Money transfer | Buy Bitcoin
Available in multiple traditional currencies
(dollars, euro, and GBP)
supported countries are temporarily limited to
European region + Israel and Turkey
SIGN UP FOR FREE
25% discount on your first plastic card.


Timing Channels in Cryptography [Repost]

Posted By: tanas.olesya
Timing Channels in Cryptography [Repost]

Timing Channels in Cryptography: A Micro-Architectural Perspective by Chester Rebeiro
English | 31 Dec. 2014 | ISBN: 3319123696 | 162 Pages | PDF | 6 MB

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors.

Achieving and Sustaining Secured Business Operations

Posted By: Underaglassmoon
Achieving and Sustaining Secured Business Operations

Achieving and Sustaining Secured Business Operations: An Executive’s Guide to Planning and Management
Apress | English | 2018 | ISBN-10: 1484230981 | 168 pages | PDF | 5.39 mb

by Neelesh Ajmani (Author), Dinesh Kumar (Author)

Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China [Repost]

Posted By: ChrisRedfield
Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China [Repost]

Kefei Chen, Dongdai Lin, Moti Yung - Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers
Published: 2017-04-07 | ISBN: 3319547046 | PDF | 544 pages | 20.26 MB

Cyberspace and Cybersecurity, Second Edition

Posted By: Underaglassmoon
Cyberspace and Cybersecurity, Second Edition

Cyberspace and Cybersecurity, Second Edition
CRC Press | English | Nov 2017 | ISBN-10: 1138057711 | 316 pages | PDF | 15.97 mb

by George Kostopoulos (Author)

Fault Diagnosis and Tolerance in Cryptography

Posted By: DZ123
Fault Diagnosis and Tolerance in Cryptography

Luca Breveglieri, Israel Koren, David Naccache, "Fault Diagnosis and Tolerance in Cryptography"
English | 2006 | ISBN: 3540462503 | PDF | pages: 263 | 2.5 mb

Theory of Cryptography (Repost)

Posted By: DZ123
Theory of Cryptography (Repost)

Yehuda Lindell, "Theory of Cryptography"
English | 2014 | ISBN: 3642542417 | PDF | pages: 751 | 12.0 mb

A Material History of Medieval and Early Modern Ciphers: Cryptography and the History of Literacy

Posted By: Underaglassmoon
A Material History of Medieval and Early Modern Ciphers: Cryptography and the History of Literacy

A Material History of Medieval and Early Modern Ciphers: Cryptography and the History of Literacy
Routledge | English | 2017 | ISBN-10: 1138244643 | 298 pages | PDF | 5.52 mb

by Katherine Ellison (Editor),‎ Susan Kim (Editor)

Algebra for Cryptologists (Springer Undergraduate Texts in Mathematics and Technology) (repost)

Posted By: zxcvbn
Algebra for Cryptologists (Springer Undergraduate Texts in Mathematics and Technology) (repost)

Algebra for Cryptologists (Springer Undergraduate Texts in Mathematics and Technology)
Alko R. Meijer | 2016 | PDF | ISBN: 3319303953 | 301 pages | 3 Mb

Serious Cryptography: A Practical Introduction to Modern Encryption

Posted By: arundhati
Serious Cryptography: A Practical Introduction to Modern Encryption

Jean-Philippe Aumasson, "Serious Cryptography: A Practical Introduction to Modern Encryption"
2017 | ISBN-10: 1593278268 | 312 pages | PDF conv | 5 MB

Codes, Cryptology, and Information Security

Posted By: step778
Codes, Cryptology, and Information Security

Said El Hajji, Abderrahmane Nitaj, Claude Carlet, "Codes, Cryptology, and Information Security"
2015 | pages: 397 | ISBN: 3319186809 | PDF | 10,4 mb

Applied Cryptography: Protocols, Algorithms and Source Code in C, 20th Anniversary Edition

Posted By: arundhati
Applied Cryptography: Protocols, Algorithms and Source Code in C, 20th Anniversary Edition

Bruce Schneier, "Applied Cryptography: Protocols, Algorithms and Source Code in C, 20th Anniversary Edition"
2015 | ISBN-10: 1119096723 | 784 pages | EPUB | 22 MB

Sequences, Subsequences, and Consequences (Repost)

Posted By: DZ123
Sequences, Subsequences, and Consequences (Repost)

, "Sequences, Subsequences, and Consequences"
English | 2007 | ISBN: 3540774033 | PDF | pages: 226 | 3.0 mb

Codes, Cryptology and Curves with Computer Algebra

Posted By: Underaglassmoon
Codes, Cryptology and Curves with Computer Algebra

Codes, Cryptology and Curves with Computer Algebra
Cambridge | English | Nov 2017 | ISBN-10: 0521817110 | 600 pages | PDF | 7.57 mb

by Ruud Pellikaan (Author),‎ Xin-Wen Wu (Author),‎ Stanislav Bulygin (Author),‎ Relinde Jurrius (Author)

A Course in Number Theory and Cryptography (2nd edition) [Repost]

Posted By: ChrisRedfield
A Course in Number Theory and Cryptography (2nd edition) [Repost]

Neal Koblitz - A Course in Number Theory and Cryptography (2nd edition)
Published: 1994-09-02 | ISBN: 0387942939, 1461264421, 3540942939 | PDF | 235 pages | 6.14 MB

The Case of Alan Turing: The Extraordinary and Tragic Story of the Legendary Codebreaker

Posted By: First1
The Case of Alan Turing: The Extraordinary and Tragic Story of the Legendary Codebreaker

The Case of Alan Turing: The Extraordinary and Tragic Story of the Legendary Codebreaker by Eric Liberge,‎ Arnaud Delalande
English | October 18th, 2016 | ISBN: 1551526506 | 103 Pages | PDF | 34.58 MB

Alan Turing, subject of the Oscar-winning 2014 film The Imitation Game, was the brilliant mathematician solicited by the British government to help decipher messages sent by Germany's Enigma machines during World War II. The work of Turing and his colleagues at Hut 8 created what became known as the "bombe" which descrambled the German navy's messages and saved countless lives and millions in British goods and merchandise.