TOPICS
Search

Cryptography


The science of adversarial information protection.


See also

Coding Theory, Cryptarithmetic, Cryptographic Hash Function, Cryptology, Knapsack Problem, Public-Key Cryptography, Trapdoor One-Way Function

Explore with Wolfram|Alpha

References

Davies, D. W. The Security of Data in Networks. Los Angeles, CA: IEEE Computer Soc., 1981.Diffie, W. and Hellman, M. "New Directions in Cryptography." IEEE Trans. Info. Th. 22, 644-654, 1976.Honsberger, R. "Four Clever Schemes in Cryptography." Ch. 10 in Mathematical Gems III. Washington, DC: Math. Assoc. Amer., pp. 151-173, 1985.Lewand, R. E. Cryptological Mathematics. Washington, DC: Math. Assoc. Amer., 2000.Menezes, A. J.; van Oorschot, P.; and Vanstone, S. A. Handbook of Applied Cryptography. Boca Raton, FL: CRC Press, 1996.Schneier, B Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed. New York: Wiley, 1996.Simmons, G. J. "Cryptology, The Mathematics of Secure Communications." Math. Intel. 1, 233-246, 1979.van Tilborg, H. C. A. Fundamentals of Cryptography: A Professional Reference and Interactive Tutorial. Norwell, MA: Kluwer, 1999.

Referenced on Wolfram|Alpha

Cryptography

Cite this as:

Weisstein, Eric W. "Cryptography." From MathWorld--A Wolfram Web Resource. https://mathworld.wolfram.com/Cryptography.html

Subject classifications