scispace - formally typeset
Open AccessBook

Codes and ciphers

TLDR
This thoroughly researched, highly readable volume has biographies of famous--and infamous--spies and cryptographers, illustrations of codes and cipher devices with explanations of how they work, and fascinating examples of how covert communications have changed the course of history.
Abstract
This thoroughly researched, highly readable volume has biographies of famous--and infamous--spies and cryptographers, illustrations of codes and cipher devices with explanations of how they work, and fascinating examples of how covert communications have changed the course of history, from ancient times through World War II and beyond. 50 photos and illustrations; tables and graphs throughout.

read more

Citations
More filters
Book

Insanely Great: The Life and Times of Macintosh, the Computer that Changed Everything

Steven Levy
TL;DR: The story behind the Macintosh Computer is described in this paper, where the authors describe the research and development that led to the first 128K Mac and the struggles involved to make the continued evolution of the Macintosh possible.
Patent

Data transmission using DNA oligomers

TL;DR: In this article, the authors proposed methods for encrypting information in the form of words, numbers, or graphical images, by obtaining a set of nucleic acid strands or nucleic acids analog strands having subunit sequences selected to represent the information.
Journal ArticleDOI

Explaining cryptographic systems

TL;DR: This paper describes simple versions of such applications that have been used to give school-children and the general public a broad understanding of what can be achieved, and how.
Journal ArticleDOI

Biometric Signature of Private Key by Reliable Iris Recognition Based on Flexible-ICA Algorithm

TL;DR: A biometric solution of owner signature generating an encryption of the key using the iris recognition kept in a smart card using a scheme based on block encryption which offers a very propagation of a high level of confusion and diffusion.

Top-k Query Processing Over Outsourced Encrypted Data

TL;DR: This paper addresses the problem of top-k query processing over encrypted data, and proposes an efficient approach called BuckTop, which uses the bucketization technique to manage the encrypted data in the remote server and has a filtering algorithm that efficiently eliminates the false positives in the server side.