Explore: Cryptology

Discover books, insights, and more — all in one place.

Learn more about Cryptology with top reads curated from trusted sources — all in one place.

Topic Search

Search for any topic

AI-Generated Overview About “cryptology”:


Books Results

Source: The Open Library

The Open Library Search Results

Search results from The Open Library

1The Korean War

By

“The Korean War” Metadata:

  • Title: The Korean War
  • Author:
  • Language: English
  • Number of Pages: Median: 18
  • Publisher: ➤  National Security Agency - Center for Cryptologic History, National Security Agency
  • Publish Date:
  • Publish Location: ➤  Fort George G. Meade, Md - [Fort George G. Meade, Md.]

“The Korean War” Subjects and Themes:

Edition Identifiers:

Access and General Info:

  • First Year Published: 2000
  • Is Full Text Available: No
  • Is The Book Public: No
  • Access Status: No_ebook

Online Marketplaces

Find The Korean War at online marketplaces:


2Series on Arabic origins of cryptology

By

Book's cover

“Series on Arabic origins of cryptology” Metadata:

  • Title: ➤  Series on Arabic origins of cryptology
  • Author:
  • Languages: ara - English
  • Number of Pages: Median: 204
  • Publisher: ➤  King Faisal Center for Research and Islamic Studies - KFCRIS & KACST
  • Publish Date:
  • Publish Location: Riyadh

“Series on Arabic origins of cryptology” Subjects and Themes:

Edition Identifiers:

Access and General Info:

  • First Year Published: 2003
  • Is Full Text Available: No
  • Is The Book Public: No
  • Access Status: No_ebook

Online Marketplaces

Find Series on Arabic origins of cryptology at online marketplaces:


3ha-Tseniḥah ha-goralit

By

“ha-Tseniḥah ha-goralit” Metadata:

  • Title: ha-Tseniḥah ha-goralit
  • Authors:
  • Language: heb
  • Number of Pages: Median: 128
  • Publisher: Grafor-Dafṭal
  • Publish Date:
  • Publish Location: Tel Aviv

“ha-Tseniḥah ha-goralit” Subjects and Themes:

Edition Identifiers:

Access and General Info:

  • First Year Published: 1991
  • Is Full Text Available: No
  • Is The Book Public: No
  • Access Status: No_ebook

Online Marketplaces

Find ha-Tseniḥah ha-goralit at online marketplaces:


4The Voynich Manuscript

Book's cover

“The Voynich Manuscript” Metadata:

  • Title: The Voynich Manuscript
  • Number of Pages: Median: 209
  • Publisher: ➤  Yale University Library Original
  • Publish Date:

“The Voynich Manuscript” Subjects and Themes:

Edition Identifiers:

Access and General Info:

  • Is Full Text Available: Yes
  • Is The Book Public: Yes
  • Access Status: Public

Online Access

Downloads:

    Online Borrowing:

    Online Marketplaces

    Find The Voynich Manuscript at online marketplaces:



    Wiki

    Source: Wikipedia

    Wikipedia Results

    Search Results from Wikipedia

    Cryptography

    Cryptography, or cryptology (from Ancient Greek: κρυπτός, romanized: kryptós "hidden, secret"; and γράφειν graphein, "to write", or -λογία -logia, "study"

    International Association for Cryptologic Research

    (IACR) is a non-profit scientific organization that furthers research in cryptology and related fields. The IACR was organized at the initiative of David

    Journal of Cryptology

    The Journal of Cryptology (ISSN 0933-2790) is a scientific journal in the field of cryptology and cryptography. The journal is published quarterly by the

    Key (cryptography)

    A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic

    RIPEMD

    Daniele Micciancio (eds.). Advances in Cryptology – CRYPTO 2019, Proceesings vol 2. 39th Annual International Cryptology Conference, Santa Barbara, CA, USA

    Quantum cryptography

    Charles H.; et al. (1992). "Experimental quantum cryptography". Journal of Cryptology. 5 (1): 3–28. doi:10.1007/bf00191318. S2CID 206771454. Wiesner, Stephen

    Cryptology ePrint Archive

    The Cryptology ePrint Archive is an electronic archive (eprint) of new results in the field of cryptography, maintained by the International Association

    Plugboard

    A plugboard or control panel (the term used depends on the application area) is an array of jacks or sockets (often called hubs) into which patch cords

    Grill (cryptology)

    The grill method (Polish: metoda rusztu), in cryptology, was a method used chiefly early on, before the advent of the cyclometer, by the mathematician-cryptologists

    Marc Stevens (cryptology)

    Dr. ir. Marc Stevens is a cryptology researcher most known for his work on cryptographic hash collisions and for the creation of the chosen-prefix hash