Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital AgePenguin, 8 jan. 2001 - 368 sidor If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy—the author who made "hackers" a household word—comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction. |
Innehåll
Avsnitt 19 | |
Avsnitt 20 | |
Avsnitt 21 | |
Avsnitt 22 | |
Avsnitt 23 | |
Avsnitt 24 | |
Avsnitt 25 | |
Avsnitt 26 | |
Avsnitt 9 | |
Avsnitt 10 | |
Avsnitt 11 | |
Avsnitt 12 | |
Avsnitt 13 | |
Avsnitt 14 | |
Avsnitt 15 | |
Avsnitt 16 | |
Avsnitt 17 | |
Avsnitt 18 | |
Avsnitt 27 | |
Avsnitt 28 | |
Avsnitt 29 | |
Avsnitt 30 | |
Avsnitt 32 | |
Avsnitt 33 | |
Avsnitt 34 | |
Avsnitt 35 | |
Avsnitt 36 | |
Andra upplagor - Visa alla
Crypto: How the Code Rebels Beat the Government--Saving Privacy in the ... Steven Levy Ingen förhandsgranskning - 2002 |
Crypto: How the Code Rebels Beat the Government--Saving Privacy in the ... Steven Levy Ingen förhandsgranskning - 2001 |
Vanliga ord och fraser
academic actually Adleman Alice anonymous attack began bits called Chaum cipher ciphertext Clinton Clipper Chip Codebreakers communications course crack cryptanalysis cryptosystem Cylink cypherpunks Data Encryption Standard decryption Diffie and Hellman Diffie-Hellman Diffie’s digital signature eavesdropper electronic Ellis Encryption Standard export Feistel figured Fort Meade GCHQ going government’s guys idea implementation Inman Internet issue Jim Bidzos key escrow key size knapsack knew Konheim later Len Adleman license Lotus Lucifer Marty Hellman mathematical Meade memo Merkle Merkle’s Microsoft Myhrvold National Security Agency Netscape NIST NSA’s O’Brien one-way function paper patent Phil Zimmermann plaintext potential problem protect public key cryptography puzzle Ray Ozzie remailer Ron Rivest RSA Data Security RSA’s says scheme scrambled secret key Shamir solution someone Stanford thing trapdoor Triple Fence Tuchman users wanted Whit Diffie wrote