#
Cryptography
Resource Information
The concept ** Cryptography** represents the subject, aboutness, idea or notion of resources found in **University of Missouri Libraries**.

The Resource
Cryptography
Resource Information

The concept

**Cryptography**represents the subject, aboutness, idea or notion of resources found in**University of Missouri Libraries**.- Label
- Cryptography

## Context

Context of Cryptography#### Subject of

No resources found

No enriched resources found

- .NET security and cryptography
- A classical introduction to cryptography : applications for communications security
- A classical introduction to cryptography : applications for communications security
- A course in number theory and cryptography
- A course in number theory and cryptography
- A critique of some public-key cryptosystems
- A cryptosystem for one-to-multipoint communication
- A discovery of a new world, or, A discourse tending to prove, that 'tis probable there may be another habitable world in the moon : with a discourse concerning the probability of a passage thither : unto which is added, A discourse concerning a new planet, tending to prove, that 'tis probable our Earth is one of the planets : in two parts
- A discovery of a new world, or, A discourse tending to prove, that 'tis probable there may be another habitable world in the moon : with a discourse concerning the probability of a passage thither : unto which is added, A discourse concerning a new planet, tending to prove, that 'tis probable our Earth is one of the planets : in two parts
- Advanced statistical steganalysis
- Advances in cryptology--EUROCRYPT '91 : Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, April 8-11, 1991 : proceedings
- Advances in cryptology--EUROCRYPT '94 : Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994 : proceedings
- Algebraic cryptanalysis
- Algebraic curves and cryptography
- Ancient Norse messages on American stones
- Applied Cryptography in .NET and Azure Key Vault : a Practical Guide to Encryption in .NET and .NET Core
- Applied cryptography : protocols, algorithms, and source code in C
- Applied cryptography : protocols, algorithms, and source code in C
- Applied cryptography : protocols, algorithms, and source code in C
- Authentication systems for secure networks
- Basics of contemporary cryptography for IT practitioners
- Boolean functions in coding theory and cryptography
- Building in big brother : the cryptographic policy debate
- Calendar of state papers, foreign series, of the reign of Elizabeth : preserved in the State Paper Department of Her Majesty's Public Record Office
- Chinese remainder theorem : applications in computing, coding, cryptography
- Cipher systems : the protection of communications
- Classical and contemporary cryptology
- Codes : an introduction to information communication and cryptography
- Codes : an introduction to information communication and cryptography
- Codes and ciphers : Julius Caesar, the Enigma, and the internet
- Codes and ciphers : secret writing through the ages
- Coding for data and computer communications
- Coding for data and computer communications
- Coding theory and cryptology
- Communications Intelligence Activities
- Communications and coding
- Complexity and cryptography : an introduction
- Complexity theory and cryptology : an introduction to cryptocomplexity
- Complexity theory and cryptology : an introduction to cryptocomplexity
- Computer security & cryptography
- Computer security and cryptography
- Computer security and industrial cryptography : state of the art and evolution : ESAT course, Leuven, Belgium, May 21-23, 1991
- Computer security and industrial cryptography : state of the art and evolution : ESAT course, Leuven, Belgium, May 21-23, 1991
- Concurrent zero-knowledge
- Concurrent zero-knowledge
- Construction and analysis of cryptographic functions
- Cracking codes & cryptograms for dummies
- Cryptanalysis of number theoretic ciphers
- Cryptanalytic attacks on RSA
- Cryptanalytic attacks on RSA
- Crypto : how the code rebels beat the government--saving privacy in the digital age
- Cryptographic algorithms on reconfigurable hardware
- Cryptographic engineering
- Cryptography : Infosec pro guide
- Cryptography : an introduction
- Cryptography : theory and practice
- Cryptography and data security
- Cryptography and network security
- Cryptography and security
- Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto
- Cryptography for developers
- Cryptography in C and C++
- Cryptography, a primer
- Cryptography, information theory, and error-correction : a handbook for the 21st century
- Cryptological mathematics
- Cryptology : an introduction to the art and science of enciphering, encrypting, concealing, hiding, and safeguarding described without any arcane skullduggery but not without cunning waggery for the delectation and instruction of the general public
- Cryptology unlocked
- Cryptomenysis patefacta, or, The art of secret information disclosed without a key : containing, plain and demonstrative rules, for decyphering all manner of secret writing with exact methods, for resolving secret intimations by signs or gestures, or in speech : as also an inquiry into the secret ways of conveying written messages, and the several mysterious proposals for secret information, mentioned by Trithemius, &c.
- Data-driven block ciphers for fast telecommunication systems
- Decrypted secrets : methods and maxims of cryptology
- Decrypted secrets : methods and maxims of cryptology
- Die Geheimschriften im Dienste des GeschÃ¤fts- und Verkehrslebens : praktische Anleitung zu chiffrierten Korrespondenzen mit zahlreichen Alphabeten und leicht verstÃ¤ndlichen Beispielen
- Differential cryptanalysis of the data encryption standard
- Digital Signature Schemes : General Framework and Fail-Stop Signatures
- Digital signature schemes : general framework and fail-stop signatures
- Disappearing cryptography : information hiding : steganography & watermarking
- Disappearing cryptography : information hiding : steganography & watermarking
- Disappearing cryptography : information hiding : steganography & watermarking
- Disappearing cryptography : information hiding, steganography & watermarking
- Distributed programming paradigms with cryptography applications
- Dynamic secrets in communication security
- Efficient secure two-party protocols : techniques and constructions
- Elementary cryptanalysis : a mathematical approach
- Elementary number Theory, cryptography and codes
- Elliptic curves : number theory and cryptography
- Elliptic curves and their applications in cryptography
- Elliptic curves and their applications to cryptography : an introduction
- Elliptic curves in cryptography
- Finite automata and application to cryptography
- Finite fields and applications
- Finite-field wavelets with applications in cryptography and coding
- Fundamentals of computer security
- Fundamentals of cryptology : a professional reference and interactive tutorial
- Group-based cryptography
- Group-based cryptography
- GrÃ¶bner bases, coding, and cryptography
- Hands-on cryptography with Java
- Hands-on cryptography with Python : leverage the power of Python to encrypt and decrypt data
- Hashing in computer science : fifty years of slicing and dicing
- Hiding behind the keyboard : uncovering covert communication methods with forensic analysis
- Hiding behind the keyboard : uncovering covert communication methods with forensic analysis
- How to securely replicate services
- IBM eserver zSeries 990 (z990) cryptography implementation
- Implementation of spread spectrum image steganography
- Information security intelligence : cryptographic principles and applications
- Information theory : coding and cryptography
- Introduction to cryptography
- Introduction to cryptography
- Introduction to cryptography : principles and applications
- Introduction to cryptography : with coding theory
- Introduction to cryptography and network security
- Introduction to cryptography with Maple
- Introduction to modern cryptography
- Java cryptography
- Kryptografie : verfahren, protokolle, infrastrukturen
- Kryptologie : Konstruktion und Entzifferung von Geheimschriften
- Le livre du jour et de la nuit
- Lectures on data security : modern cryptology in theory and practice
- Lectures on data security : modern cryptology in theory and practice
- Lightweight cryptographic protocols for mobile devices
- Machine cryptography and modern cryptanalysis
- Malicious cryptography : exposing cryptovirology
- Malicious cryptography : exposing cryptovirology
- Mathematical cryptology for computer scientists and mathematicians
- Mathematical recreations & essays
- Mathematical recreations & essays
- Mathematical recreations and essays
- Mathematical recreations and essays
- Message authentication code (MAC) validation system : requirements and procedures
- Military cryptanalysis
- Modelling and Analysis of Security Protocols
- Modern cryptanalysis : techniques for advanced code breaking
- Modern cryptography : theory and practice
- Modern cryptography, probabilistic proofs and pseudorandomness
- Modern cryptology : a tutorial
- Modern cryptology : a tutorial
- Networked RFID systems and lightweight cryptography : raising barriers to product counterfeiting
- Non-commutative cryptography and complexity of group-theoretic problems
- Number theoretic methods in cryptography : complexity lower bounds
- Post-quantum cryptography
- Practical cryptography in Python : learning correct cryptography by example
- Practical signcryption
- Primality testing and integer factorization in public-key cryptography
- Primality testing and integer factorization in public-key cryptography
- Progress in cryptology - Africacrypt 2010 : third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. proceedings
- Public-key cryptography
- Public-key cryptography
- Public-key cryptography : state of the art and future directions : E.I.S.S. workshop, Oberwolfach, Germany, July 3-6, 1991 : final report
- Quantum cryptography : a comparative study
- Quantum private communication
- Rarities, or, The incomparable curiosities in secret writing, both aswel [i.e. as well as] by waters as cyphers, explained and made familiar to the meanest capacity : by which ministers of state may manage the intrigues of court and grand concerns of princes, the ladies communicate their amours, and every ordinary person (onely capable of legible writing) may order his private affairs with all imaginable safety and secrecy ...
- Recent advances in RSA cryptography
- Renewed crypto wars
- Secret and urgent : the story of codes and ciphers
- Secret language
- Secure communications and asymmetric cryptosystems
- Secure information transfer, PC encryption : a practical guide
- Selected areas in cryptography : 8th Annual International Workshop, SAC 2001, Toronto, Ontario, Canada, August 16-17, 2001 : Revised papers
- State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures
- State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures
- Stenographie and crytographie, or, The arts of short and secret writing : the first laid down in a method familiar to meane capacities, the second added to convince and cautionate the credulous and the confident, and to exercise and humour the ingenious and their fancies
- Stenographie and crytographie, or, The arts of short and secret writing : the first laid down in a method familiar to meane capacities, the second added to convince and cautionate the credulous and the confident, and to exercise and humour the ingenious and their fancies
- Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection
- Tableau syllabique et steganographique ... = A Syllabical and steganographical table ...
- The American black chamber
- The Montefeltro conspiracy : a Renaissance mystery decoded
- The block cipher companion
- The book of codes : understanding the world of hidden messages : an illustrated guide to signs, symbols, ciphers, and secret languages
- The crypto controversy : a key conflict in the information society
- The discrete logarithm public cryptographic system
- The first book of codes and ciphers
- The mathematical and philosophical works of the Right Rev. John Wilkins
- The mathematics of ciphers : number theory and RSA cryptography
- The modelling and analysis of security protocols : the CSP approach
- The nature and power of mathematics
- Third-round report of the SHA-3 cryptographic hash algorithm competition
- To Prevent Disclosures Concerning the Cryptographic Systems and the Communication Intelligence Activities of the U.S.
- Topics in geometry, coding theory and cryptography
- Understanding and applying cryptography and data security
- Understanding cryptography : a textbook for students and practitioners
- Web application obfuscation : '-/WAFs.evasion.filters//alert (/obfuscation/)-'
- Web application obfuscation : -/WAFs. Evasion. Filters//alert (/Obfuscation/)-
- Zur Analyse des Data Encryption : Standard und Synthese verwandter Chiffriersysteme

## Embed

### Settings

Select options that apply then copy and paste the RDF/HTML data fragment to include in your application

Embed this data in a secure (HTTPS) page:

Layout options:

Include data citation:

<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/h3jDwrnUWjg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/h3jDwrnUWjg/">Cryptography</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>

Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements

### Preview

## Cite Data - Experimental

### Data Citation of the Concept Cryptography

Copy and paste the following RDF/HTML data fragment to cite this resource

`<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/h3jDwrnUWjg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/h3jDwrnUWjg/">Cryptography</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>`