#
Cryptography
Resource Information
The concept ** Cryptography** represents the subject, aboutness, idea or notion of resources found in **University of Oklahoma Libraries**.

The Resource
Cryptography
Resource Information

The concept

**Cryptography**represents the subject, aboutness, idea or notion of resources found in**University of Oklahoma Libraries**.- Label
- Cryptography

## Context

Context of Cryptography#### Subject of

- A classical introduction to cryptography : applications for communications security
- A classical introduction to cryptography exercise book
- A course in number theory and cryptography
- A critique of some public-key cryptosystems
- A discovery of a new world, or, A discourse tending to prove, that 'tis probable there may be another habitable world in the moon : with a discourse concerning the probability of a passage thither : unto which is added, A discourse concerning a new planet, tending to prove, that 'tis probable our Earth is one of the planets : in two parts
- A discovery of a new world, or, A discourse tending to prove, that 'tis probable there may be another habitable world in the moon : with a discourse concerning the probability of a passage thither : unto which is added, A discourse concerning a new planet, tending to prove, that 'tis probable our Earth is one of the planets : in two parts
- Abstract algebra : applications to Galois theory, algebraic geometry, and cryptography
- Achieving higher-fidelity conjunction analyses using cryptography to improve information sharing
- Achieving higher-fidelity conjunction analyses using cryptography to improve information sharing
- Advanced DPA theory and practice : towards the security limits of secure embedded circuits
- Advanced statistical steganalysis
- Advances in cryptology, CRYPTO '98 : 18th Annual International Conference, Santa Barbara, California, USA, August 23-27, 1998 : proceedings
- Algebraic curves and cryptography
- Algebraic geometry in coding theory and cryptography
- Algebraic geometry modeling in information theory
- Algorithmic cryptanalysis
- An essay on the art of decyphering : in which is inserted a discourse of Dr. Wallis : now first publish'd from his original manuscript in the publick library at Oxford
- An introduction to cryptology
- An introduction to number theory with cryptography
- Ancient Norse messages on American stones,
- Applied cryptanalysis : breaking ciphers in the real world
- Applied cryptography : protocols, algorithms, and source code in C
- Applied cryptography for cyber security and defense : information encryption and cyphering
- Applied cryptology, cryptographic protocols, and computer security models
- Applied cryptology, cryptographic protocols, and computer security models
- Applied cryptology, cryptographic protocols, and computer security models.
- Applied quantum cryptography
- Authentication codes and combinatorial designs
- Basics of contemporary cryptography for IT practitioners
- Beginning cryptography with Java
- Boolean functions and their applications in cryptography
- Boolean functions in coding theory and cryptography
- Broadband quantum cryptography
- Building in big brother : the cryptographic policy debate
- Chaos synchronization and cryptography for secure communications : applications for encryption
- Chaos-based cryptography : theory, algorithms and applications
- Cipher systems : the protection of communications
- Classical and contemporary cryptology
- Cloak and cipher
- Code Talkers Recognition Act of 2008
- Codes : an introduction to information communication and cryptography
- Codes and Ciphers : Julius Caesar, the Enigma, and the Internet
- Codes and ciphers : Julius Caesar, the Enigma and the internet
- Codes and ciphers : Julius Caesar, the Enigma, and the internet
- Codes and ciphers : secret writing through the ages
- Codes and cryptography
- Codes and secret writing
- Codes, ciphers, and computers : an introduction to information security
- Coding for data and computer communications
- Coding theory and cryptography : the essentials
- Coding theory and cryptography : the essentials
- Coding theory and cryptology
- Coding, cryptography, and combinatorics
- Communications Intelligence Activities
- Communications and coding
- Comparative analysis of the keyed communication in quantum noise (KCQ) coherent state protocol and the braided single-stage protocol
- Complexity and cryptography : an introduction
- Complexity theory and cryptology : an introduction to cryptocomplexity
- Concurrent zero-knowledge
- Construction and analysis of cryptographic functions
- Contemporary cryptology : the science of information integrity
- Contemporary cryptology : the science of information integrity
- Cryptanalysis; : a study of ciphers and their solution
- Cryptanalytic attacks on RSA
- Crypto : how the code rebels beat the government--saving privacy in the digital age
- Cryptographic Boolean functions and applications
- Cryptographic Boolean functions and applications
- Cryptographic algorithms on reconfigurable hardware
- Cryptographic and Communication Intelligence Security
- Cryptographic engineering
- Cryptographic security solutions for the Internet of Things
- Cryptography : a very short introduction
- Cryptography : theory and practice
- Cryptography and data security
- Cryptography and e-commerce : a Wiley tech brief
- Cryptography and secure communication
- Cryptography and secure communication
- Cryptography for Internet and database applications : developing secret and public key techniques with Java
- Cryptography for Visual Basic : a programmer's guide to the Microsoft CryptoAPI
- Cryptography in C and C++
- Cryptography in C and C++
- Cryptography in the database : the last line of defense
- Cryptography made simple
- Cryptography's role in securing the information society
- Cryptography's role in securing the information society
- Cryptography's role in securing the information society
- Cryptography's role in securing the information society
- Cryptography, a primer
- Cryptography, information theory, and error-correction : a handbook for the 21st century
- Cryptography, the science of secret writing,
- Cryptography; : the science of secret writing
- Cryptology yesterday, today, and tomorrow
- Cryptomenysis patefacta, or, The art of secret information disclosed without a key : containing, plain and demonstrative rules, for decyphering all manner of secret writing with exact methods, for resolving secret intimations by signs or gestures, or in speech : as also an inquiry into the secret ways of conveying written messages, and the several mysterious proposals for secret information, mentioned by Trithemius, &c.
- Decrypted secrets : methods and maxims of cryptology
- Decrypted secrets : methods and maxims of cryptology
- Defending your digital assets : against hackers, crackers, spies and thieves
- Den hemmelige skrivekonst eller : Chiffrer-og dechiffrer-konsten, isærdeleshed practiskt oplyst ved et nyt Transpositionschiffre, der, formedelst dets utallige Afvexlinger, i forening med den største simpelhed og Lethed, kan gjøres aldeles uopløseligt, endog for den, som har opfundet det
- Dictionnaire de paléographie : de cryptographie, de dactylologie, d'hiéroglyphie, de sténographie et de télégraphie
- Differential cryptanalysis of the data encryption standard
- Digital Millennium Copyright Act
- Digital Millennium Copyright Act : Exemptions to the Prohibition on Circumvention
- Digital fingerprinting
- Digital watermarking : 9th international workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 : revised selected papers
- Disappearing cryptography : information hiding : steganography & watermarking
- Disappearing cryptography : information hiding : steganography & watermarking
- Disappearing cryptography : information hiding : steganography & watermarking
- Dynamic secrets in communication security
- Efficient secure two-party protocols : techniques and constructions
- Elementary cryptanalysis : a mathematical approach
- Elementary cryptanalysis; : a mathematical approach
- Elementary number Theory, cryptography and codes
- Elliptic curves : number theory and cryptography
- Elliptic curves in cryptography
- Encyclopedia of cryptography and security
- Enhancing further the security of the United States by preventing disclosures of information concerning the cryptographic systems and the communication intelligence activities of the United States.
- Enhancing further the security of the United States by preventing disclosures of information concerning the cryptographic systems and the communication intelligence activities of the United States.
- Enhancing further the security of the United States by preventing disclosures of information concerning the cryptographic systems and the communication intelligence activities of the United States.
- Enhancing information security and privacy by combining biometrics with cryptography
- Entanglement based quantum key distribution protocol using dual-quantum channel
- Expert SQL server 2008 encryption
- Family of quantum key distribution protocols without conventional communication channel
- Fast convergent and secure key distribution protocols using a dual-quantum channel
- Finding minimum gaps and designing key derivation functions
- Finite automata and application to cryptography
- Finite fields and applications
- Finite-field wavelets with applications in cryptography and coding
- Foundations of cryptography : a primer
- Fundamentals of cryptology : a professional reference and interactive tutorial
- Fundamentals of cryptology : a professional reference and interactive tutorial
- Group-based cryptography
- Hashing in computer science : fifty years of slicing and dicing
- Hiding in plain sight : steganography and the art of covert communication
- How to securely replicate services
- Implementation of spread spectrum image steganography
- Implementation of the three-stage protocol over free space optics
- Implementation of the three-stage protocol over optical fiber
- Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures
- Intelligent multimedia data hiding : new directions
- Intelligent watermarking techniques
- Introduction to cryptography
- Introduction to cryptography : principles and applications
- Introduction to cryptography : principles and applications
- Introduction to cryptography : with coding theory
- Introduction to cryptography with Java applets
- Introduction to cryptography with Maple
- Introduction to modern cryptography
- Investigator's guide to steganography
- Java cryptography
- Java cryptography extensions : practical guide for programmers
- Johannis Trithemii primo Spanheimensis deinde divi Jacobi Peapolitani abbatis Steganographia : qv hvcvsqve a nemine intellecta, sed passim vt svpposititia, perniciosa, magica et necromantica, reiecta, elvsa, damnata et sententiam inqvisitionis passa; nvnc tandem vindicata reserata et illvstrata vbi post vindicias Trithemii clarissime explicantvr conjvrationes spiritvvm ... deinde solvvntvr et exhibentvr artificia nova stegographica a Trithemio in literis ad Arnoldvm Bostivm et Polygraphia promissa, in hvnc diem a nemine capta, sed pro paradoxis et impossibilibvs habita et svmme desiderata.
- Kahn on codes : secrets of the new cryptology
- La cryptographie dévoilée; ou, Art de traduire ou dedéchiffrer toutes les écritures en quelques caractères et en quelqueslangues que ce soit, quoique l'on ne connaisse ni ces caractères ni ceslangues; appliqué aux langues française, allemande, anglaise, latine,italienne, flamande et hollandaise, suivi d'un précis analytique des languesécrites, au moyen duquel on peut les traduire, sans en avoir aucuneconnaissance préalable,
- Lectures on data security : modern cryptology in theory and practice
- Mathematical recreations & essays,
- Michael P. Wright Collection., 1976-2004
- Military cryptanalysis
- Modern cryptography, probabilistic proofs and pseudorandomness
- Multi-photon tolerant protocols for quantum secure wireless communication standards
- Multi-photon tolerant quantum key distribution protocols for secured global communication
- Navajo code talkers
- Networked RFID systems and lightweight cryptography : raising barriers to product counterfeiting
- Non-commutative cryptography and complexity of group-theoretic problems
- Norse medieval cryptography in runic carvings,
- Number theoretic methods in cryptography : complexity lower bounds
- Number theory and cryptography
- Opuscoli morali
- Overwriting unreachable code with binary mimicry in the executable file
- PKI assessment guidelines : guidelines to help assess and facilitate interoperable trustworthy public key infrastructures
- Physics and theoretical computer science : from numbers and languages to (quantum) cryptography
- Polygraphiae libri sex, Ioannis Trithemii, Abbatis Peapolitani, quondam Spanheimensis, ad Maximilianum I. Cæsarem : Accessit clauis Polygraphiæ liber vnus, eodem authore : continetur autem his libris ratio, qua potest alter alteri quæcunque voluerit, non solùm occultè, verumetiam interdum citra suspicionem significare : ostendunt & methodum tam in docendo quàm discendo vtilissimam : prætereà facultatem profundissima quæque artium ac disciplinarum mysteria intelligendi
- Post-quantum cryptography
- Post-quantum cryptography
- Practical signcryption
- Primality and cryptography
- Primality testing and integer factorization in public-key cryptography
- Primality testing and integer factorization in public-key cryptography
- Principles of secure communication systems
- Progress in applications of Boolean functions
- Progress in cryptology - Africacrypt 2010 : third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. proceedings
- Public-key cryptography
- Quantum Private Communication
- Quantum bits and quantum secrets : how quantum physics is revolutionizing codes and computers
- Quantum communications and cryptography
- Quantum computing : progress and prospects
- Quantum cryptography and secret-key distillation
- Quantum cryptography and secret-key distillation
- Quantum information, computation and cryptography : an introductory survey of theory, technology and experiments
- Quantum private communication
- Quantum secure communication using polarization hopping multi-stage protocols
- Rarities, or, The incomparable curiosities in secret writing, both aswel [i.e. as well as] by waters as cyphers, explained and made familiar to the meanest capacity : by which ministers of state may manage the intrigues of court and grand concerns of princes, the ladies communicate their amours, and every ordinary person (onely capable of legible writing) may order his private affairs with all imaginable safety and secrecy ...
- Satellite encryption
- Secret and urgent : the story of codes and ciphers
- Secret and urgent; : the story of codes and ciphers,
- Secret language
- Secure AES key transmission using polarization encoding over optical fiber
- Secure communications and asymmetric cryptosystems
- Selected areas in cryptography : 8th Annual International Workshop, SAC 2001, Toronto, Ontario, Canada, August 16-17, 2001 : Revised papers
- State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures
- Steganographiæ nec non Clauiculæ Salomonis germani
- Steganography and watermarking
- Stenographie and cryptographie, or, The arts of short and secret writing : the first laid down in a method familiar to meane capacities, the second added to convince and cautionate the credulous and the confident, and to exercise and humour the ingenious and their fancies
- Studies on deep holes and discrete logarithms
- Study of matrices related to discrete logarithm in Kummer extensions
- Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection
- Symmetric cryptographic protocols
- System-on-Chip Architectures and Implementations for Private-Key Data Encryption
- Tableau syllabique et steganographique ... = A Syllabical and steganographical table ...
- Tableau syllabique et steganographique ... = A Syllabical and steganographical table ...
- Thaumaturgus mathematicus,
- The American black chamber
- The Cat's elbow and other secret languages
- The Montefeltro conspiracy : a Renaissance mystery decoded
- The block cipher companion
- The braided single stage protocol and its application in quantum communication
- The code book : the secret history of codes and code-breaking cryptography
- The discrete logarithm public cryptographic system
- The impact of numbers of photons and coherent states on measurement error in Y-00 using ML-POVM
- The mathematical and philosophical works of the Right Rev. John Wilkens ... : To which is prefixed the author's life, and an account of his works ..
- The mathematical and philosophical works of the Right Reverend John Wilkens : to which is prefix'd the author's life, and an account of his works
- The mathematics of ciphers : number theory and RSA cryptography
- The official PGP user's guide
- The three-stage protocol using larger alphabets
- Third-round report of the SHA-3 cryptographic hash algorithm competition
- To Prevent Disclosures Concerning the Cryptographic Systems and the Communication Intelligence Activities of the U.S.
- Topics in geometry, coding theory and cryptography
- Topics in geometry, coding theory and cryptography
- Two issues in public key cryptography : RSA bit security and a new knapsack type system
- Understanding and applying cryptography and data security
- Understanding cryptography : a textbook for students and practitioners
- Visual cryptography for image processing and security : theory, methods, and applications
- Wireless security and cryptography : specifications and implementations

## Embed (Experimental)

### Settings

Select options that apply then copy and paste the RDF/HTML data fragment to include in your application

Embed this data in a secure (HTTPS) page:

Layout options:

Include data citation:

<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.libraries.ou.edu/resource/h3jDwrnUWjg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.libraries.ou.edu/resource/h3jDwrnUWjg/">Cryptography</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.libraries.ou.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.libraries.ou.edu/">University of Oklahoma Libraries</a></span></span></span></span></div>

Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements

### Preview

## Cite Data - Experimental

### Data Citation of the Concept Cryptography

Copy and paste the following RDF/HTML data fragment to cite this resource

`<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.libraries.ou.edu/resource/h3jDwrnUWjg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.libraries.ou.edu/resource/h3jDwrnUWjg/">Cryptography</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.libraries.ou.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.libraries.ou.edu/">University of Oklahoma Libraries</a></span></span></span></span></div>`