Applications of cryptography
Cryptography lists and comparisons
History of cryptography
Theory of cryptography
The main article for this category
Cryptography is, traditionally, the study of ways to convert information from its normal, comprehensible form into an obscured guise, unreadable without special knowledge — the practice of encryption. In the past, cryptography helped ensure secrecy in important communications, such as those of spies, military leaders, and diplomats. In recent decades, the field of cryptography has expanded its remit. Examples include schemes like digital signatures and digital cash, digital rights management for intellectual property protection, and securing electronic commerce. Cryptography is now often built into the infrastructure for computing and telecommunications; users may not even be aware of its presence.
Lecture 1: Introduction to Cryptography by Christof Paar
For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com. The book chapter "Introduction" for this video is also available ...
Cryptography 101 - The Basics
In this video we cover basic terminology in cryptography, including what is a ciphertext, plaintext, keys, public key crypto, and private key crypto.
Theory and Practice of Cryptography
Google Tech Talks November, 28 2007 Topics include: Introduction to Modern Cryptography, Using Cryptography in Practice and at Google, Proofs of Security and...
Public Key Cryptography: Diffie-Hellman Key Exchange
Diffie-Hellman key exchange was one of the earliest practical implementations of key exchange within the field of cryptography. It relies on the discrete log...
CISSP Training - Cryptography
PalaestraTraining.com This video on Cryptography (Part 1 of 3) is part of our CISSP certification Training Series. (ISC)2 CISSP certification is one of the t...
James Lyne: Cryptography and the power of randomness
James Lyne is the Director of Technology Strategy at Sophos, a research firm concerned with cyber security. He works with law enforcement and other defense o...
Public Key Cryptography - Computerphile
Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of Public/Private Key Cryptography note...
Cryptography: Unbroken Codes
While cryptography has progressed by leaps and bounds, some codes still haven't been broken. Tune in to learn more about some of history's strangest unbroken...
Information Security—Before & After Public-Key Cryptography
[Recorded Jan 26, 2005] Whitfield Diffie, a key figure in the discovery of public-key cryptography, traces the growth of information security through the 20t...
Public Key Cryptography: RSA Encryption Algorithm
RSA Public Key Encryption Algorithm (cryptography). How & why it works. Introduces Euler's Theorem, Euler's Phi function, prime factorization, modular expone...
Mon, 18 Aug 2014 07:07:41 -0700
“The problem is cryptography, in order to be secure, requires heavy computer-assisted calculations to make it efficient and is very impractical for humans to do,'' Queensland University of Technology researcher Xavier Boyen said. “We have a lot of new ...
MIT Technology Review
Sun, 17 Aug 2014 21:01:36 -0700
As we have argued before and have now demonstrated, modern cryptography could enable agencies to find and surgically extract warrant-authorized data about persons of interest like needles in a haystack of encrypted data, while guarding both the secrecy ...
Tue, 19 Aug 2014 03:18:45 -0700
BlackBerry has announced the creation of a new business unit designed to focus on some of its most valuable assets, ranging from the Internet of Things (IoT) to cryptography. BlackBerry said the new BlackBerry Technology Solutions (BTS) would comprise ...
Tue, 05 Aug 2014 05:56:52 -0700
Cryptographers in China have have developed a new type of cryptography that can better resist so-called offline "dictionary attacks", denial of service (DoS) hacks, and cracks involving eavesdroppers. Their approach, reported in the International ...
Tue, 05 Aug 2014 07:18:41 -0700
The National Institute of Standards and Technology (NIST) lacks independence and uncritically adhered to the wishes of US electronic eavesdroppers in releasing a weakened random-number generator in 2006. So says a group of mathematicians and ...
Tue, 12 Aug 2014 10:23:15 -0700
At the DEF CON 22 hacker conference here last week, security expert Kenneth White presented an update on the Open Crypto Audit Project, an effort by White and cryptographer Matthew Green to examine open-source cryptography software, check it for ...
Sackville Tribune Post
Fri, 01 Aug 2014 03:18:45 -0700
Mount Allison University honours computer science and math student Karen Korstanje recently presented her research at the Fourth International Workshop on Cryptography, Robustness, and Provably Secure Schemes for Female Young Researchers ...
Wed, 23 Jul 2014 14:00:00 -0700
SAN FRANCISCO & SAN DIEGO, Jul 23, 2014 (BUSINESS WIRE) -- Cryptography Research , the security division of Rambus (NASDAQ:RMBS) , and Entropic (NASDAQ:ENTR) , a world leader in semiconductor solutions for the connected home, today ...
Oops, we seem to be having trouble contacting Twitter
You can talk about Cryptography with people all over the world in our discussions.