#
Cryptography
Resource Information
The concept ** Cryptography** represents the subject, aboutness, idea or notion of resources found in **University of Manitoba Libraries**.

The Resource
Cryptography
Resource Information

The concept

**Cryptography**represents the subject, aboutness, idea or notion of resources found in**University of Manitoba Libraries**.- Label
- Cryptography

## Context

Context of Cryptography#### Subject of

No resources found

No enriched resources found

- .NET security and cryptography
- A brief history of cryptology
- A discovery of a new world, or, A discourse tending to prove, that 'tis probable there may be another habitable world in the moon : with a discourse concerning the probability of a passage thither : unto which is added, A discourse concerning a new planet, tending to prove, that 'tis probable our Earth is one of the planets : in two parts
- Abstract algebra : applications to Galois Theory, algebraic geometry, and cryptography
- Achieving higher-fidelity conjunction analyses using cryptography to improve information sharing
- Achieving higher-fidelity conjunction analyses using cryptography to improve information sharing
- Advanced linear cryptanalysis of block and stream ciphers
- Advances in cryptology : proceedings of CRYPTO 82
- Advances in cryptology : proceedings of CRYPTO 84
- Advances in cryptology : proceedings of Crypto 83
- Advances in cryptology : proceedings of EUROCRYPT 84, a Workshop on the Theory and Application of Cryptographic Techniques, Paris, France, April 9-11, 1984
- Advances in cryptology--CRYPTO '85 : proceedings
- Advances in cryptology--Eurocrypt '85 : proceedings of a workshop on the theory and application of cryptographic techniques, Linz, Austria, April 1985
- Advances in cryptology-CRYPTO '87 : proceedings
- Algebraic Geometry Modeling in Information Theory
- Algebraic curves and cryptography
- Algorithmic cryptanalysis
- An introduction to number theory with cryptography
- Ancient Norse messages on American stones
- Applied cryptanalysis : breaking ciphers in the real world
- Applied cryptography : protocols, algorithms, and source code in C
- Average case reductions for subset sum and decoding of linear codes
- Basics of contemporary cryptography for IT practitioners
- Basics of contemporary cryptography for IT practitioners
- Boolean functions in coding theory and cryptography
- C# data security handbook
- Candidate multilinear maps
- Codes and ciphers : Julius Caesar, the Enigma, and the internet
- Codes and sequences
- Codes, ciphers, and computers : an introduction to information security
- Coding and cryptography : synergy for a robust communication
- Coding theory and cryptography : the essentials
- Coding theory and cryptology
- Computer security and cryptography
- Contemporary cryptography
- Contemporary cryptology : the science of information integrity
- Cryptography : an introduction to computer security
- Cryptography : proceedings of the Workshop on cryptography, Burg Feuerstein, Germany, March 29-April 2, 1982
- Cryptography : protocols, design and applications
- Cryptography : theory and practice
- Cryptography Policy: The Guidelines and the Issues : The OECD Cryptography Policy Guidelines and the Report on Background and Issues of Cryptography Policy
- Cryptography and data security
- Cryptography and secure communication
- Cryptography arithmetic : algorithms and hardware architectures
- Cryptography for developers
- Cryptography in the database : the last line of defense
- Cryptography using weak sources of randomness
- Cryptography's role in securing the information society
- Cryptography, a primer
- Cryptography, information theory, and error-correction : a handbook for the 21st century
- Cryptology : an introduction to the art and science of enciphering, encrypting, concealing, hiding and safeguarding, described without any arcane skullduggery but not without cunning waggery for the delectation and instruction of the general public
- Cryptology : classical and modern with maplets
- Cryptomenysis patefacta, or, The art of secret information disclosed without a key : containing, plain and demonstrative rules, for decyphering all manner of secret writing with exact methods, for resolving secret intimations by signs or gestures, or in speech : as also an inquiry into the secret ways of conveying written messages, and the several mysterious proposals for secret information, mentioned by Trithemius, &c.
- Dictionnaire de paléographie : de cryptographie, de dactylologie, d'hiéroglyphie, de sténographie et de télégraphie
- Disappearing cryptography : information hiding : steganography & watermarking
- Elementary cryptanalysis; : a mathematical approach./
- Elliptic curve public key cryptosystems
- Elliptic curves : number theory and cryptography
- Elliptic curves : number theory and cryptography
- Elliptic curves in cryptography
- Emerging security algorithms and techniques
- Everyday cryptography : fundamental principles and applications
- Everyday cryptography : fundamental principles and applications
- Finite fields and applications
- Finite-field wavelets with applications in cryptography and coding
- Guide to pairing-based cryptography
- Intelligent Watermarking Techniques : Series On Innovative Intelligence
- Internet and intranet security management : risks and solutions
- Introduction to modern cryptography
- Java cryptography extensions : practical guide for programmers
- L'utopien et le lanternois : les pseudonymes et les cryptogrammes français de Thomas More et François Rabelais
- Maguire's code of ciphers : a comprehensive system of cryptography designed for general use and arranged in conformity with the rules and regulations adopted by the International Convention of Telegraph Companies, respecting "secret language telegrams"
- Mathematical recreations & essays,
- Mathematical recreations and essays
- Mathematics and computation: : a theory revolutionizing technology and science
- Modern cryptography, probabilistic proofs and pseudorandomness
- New directions of modern cryptography
- Non-commutative cryptography and complexity of group-theoretic problems
- Norse inscriptions on American stones
- Norse medieval cryptography in runic carvings
- Physics and theoretical computer science : from numbers and languages to (quantum) cryptography security
- Practical cryptography
- Public-key cryptography
- Quantum bits and quantum secrets : how quantum physics is revolutionizing codes and computers
- Quantum computing : progress and prospects
- Quantum computing : progress and prospects
- Quantum cryptography and computing : theory and implementation
- Quantum cryptography and secret-key distillation
- RSA Security's official guide to cryptography
- Rarities, or, The incomparable curiosities in secret writing, both aswel [i.e. as well as] by waters as cyphers, explained and made familiar to the meanest capacity : by which ministers of state may manage the intrigues of court and grand concerns of princes, the ladies communicate their amours, and every ordinary person (onely capable of legible writing) may order his private affairs with all imaginable safety and secrecy ...
- Runic records of the Norsemen in America
- Satellite encryption
- Secret agent Y.O.U. : the official guide to secret codes, disguises, surveillance and more
- Secret and urgent; : the story of codes and ciphers,
- Secret language
- Secure communications and asymmetric cryptosystems
- Secure multi-party computation
- Sekrety Kommunisticheskogo Internat͡sionala : shifroperepiska
- Steganography and watermarking
- Stenographie and crytographie, or, The arts of short and secret writing : the first laid down in a method familiar to meane capacities, the second added to convince and cautionate the credulous and the confident, and to exercise and humour the ingenious and their fancies
- Tableau syllabique et steganographique ... = A Syllabical and steganographical table ..
- Tableau syllabique et steganographique ... = A Syllabical and steganographical table ...
- The American black chamber,
- The Montefeltro conspiracy : a Renaissance mystery decoded
- The broken seal; : the story of Operation magic and the Pearl Harbor disaster
- The codebreakers; : the story of secret writing
- The solution of codes and ciphers
- Topics in geometry, coding theory and cryptography
- Understanding cryptography : a textbook for students and practitioners
- Wiley survival guide in global telecommunications : broadband access, optical components, and networks, and cryptography
- Zur mechanischen Sprachübersetzung : ein Programmierungsversuch aus dem Jahre 1661 : allgemeine Verschlüsselung der Sprachen = Character, pro notitia linguarum universali, deutsch-lateinisch

## Embed

### Settings

Select options that apply then copy and paste the RDF/HTML data fragment to include in your application

Embed this data in a secure (HTTPS) page:

Layout options:

Include data citation:

<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.lib.umanitoba.ca/resource/h3jDwrnUWjg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.lib.umanitoba.ca/resource/h3jDwrnUWjg/">Cryptography</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.lib.umanitoba.ca/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.lib.umanitoba.ca/">University of Manitoba Libraries</a></span></span></span></span></div>

Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements

### Preview

## Cite Data - Experimental

### Data Citation of the Concept Cryptography

Copy and paste the following RDF/HTML data fragment to cite this resource

`<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.lib.umanitoba.ca/resource/h3jDwrnUWjg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.lib.umanitoba.ca/resource/h3jDwrnUWjg/">Cryptography</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.lib.umanitoba.ca/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.lib.umanitoba.ca/">University of Manitoba Libraries</a></span></span></span></span></div>`