Secure Volunteer Computing For Distributed Cryptanalysis

Download Secure Volunteer Computing For Distributed Cryptanalysis PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Secure Volunteer Computing For Distributed Cryptanalysis book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.
Secure Volunteer Computing for Distributed Cryptanalysis

Author: Nils Kopal
language: en
Publisher: kassel university press GmbH
Release Date: 2018-01-05
The Spartan Scytale and Developments in Ancient and Modern Cryptography

Author: Martine Diepenbroek
language: en
Publisher: Bloomsbury Publishing
Release Date: 2023-11-16
This book offers a comprehensive review and reassessment of the classical sources describing the cryptographic Spartan device known as the scytale. Challenging the view promoted by modern historians of cryptography which look at the scytale as a simple and impractical 'stick', Diepenbroek argues for the scytale's deserved status as a vehicle for secret communication in the ancient world. By way of comparison, Diepenbroek demonstrates that the cryptographic principles employed in the Spartan scytale show an encryption and coding system that is no less complex than some 20th-century transposition ciphers. The result is that, contrary to the accepted point of view, scytale encryption is as complex and secure as other known ancient ciphers. Drawing on salient comparisons with a selection of modern transposition ciphers (and their historical predecessors), the reader is provided with a detailed overview and analysis of the surviving classical sources that similarly reveal the potential of the scytale as an actual cryptographic and steganographic tool in ancient Sparta in order to illustrate the relative sophistication of the Spartan scytale as a practical device for secret communication. This helps to establish the conceptual basis that the scytale would, in theory, have offered its ancient users a secure method for secret communication over long distances.
International Conference on Computer Applications 2012 :: Volume 06

Author: Kokula Krishna Hari K
language: en
Publisher: TECHNO FORUM R&D CENTRE
Release Date: