revue historique de l'armée
2eme année numéro 4 décembre 1946 in 4 broché (27,5X22 cm) 144 pages 1 carte dépliante
Bookseller reference : 2514
|
|
ACAMPORA A. S. SATELLITE CRYPTOGRAPHY
A Shared Resource TDMA Approach to Increase the Rain Margin of 12/14-Ghz Satellite Systems.
New York American Telephone and Telegraph Company 1979. 8vo. Bound in contemporary full green cloth. Volume 58 Number 9 Part 2 and Numbers 9-10 November 1979 of "The Bell System Technical Journal". Library stamp to pasted down front free end-paper and title-page. Occasional pencil marks throughout. A nice and clean copy. Pp. 2097-2111. Entire volume: Pp. 1369-2326. � First printing of this seminal paper within satellite cryptography. <br>"Perhaps the most significant research result involving the role of coding in satellite communications is the resource-sharing concept proposed by Acampora the present paper. As already mentioned rain attenuation seriously impairs communications satellites operating at frequencies above 10 Ghz. Rather than using larger antennas or site diversity to minimize communication outage a common pool of resources shared among all ground stations is much more efficient." Millman A History of Engineering & Science in the Bell System 1984 p. 231 hardcover
Bookseller reference : 43607
|
|
AMS Special Sessions; Computational Algebra Groups... 2011: Las Vegas NV and Mathematical Aspects of Cryptography... 2011: Ith
Computational and combinatorial group theory and cryptography; proceedings. Contemporary mathematics; v.582
American Mathematical Society 2012. Paperback. New Book. Paperback. The conferences were separated in time and space--Las Vegas in May and Ithaca in September--but sessions at both addressed the same areas so are published together. The 17 research and review papers represent group theory as it has been energized over the past 20 years by the emergence of geometric and asymptotic group theory algebraic geometry over groups leading to the solution of the Tarski problems and group-based cryptography. Among the topics are a new look at finitely generated metabelian groups improving Latin square based secret sharing schemes the adjunction of roots in exponential A-groups the classification of one relator limit groups and the surface group and an algorithm to express words as a product of conjugates of relators. There is no index. 2012 Ringgold Inc. Portland OR American Mathematical Society paperback
Bookseller reference : 399406 ISBN : 0821875639 9780821875636
|
|
BAR-ZOHAR, Michel.
LA 28° ENIGMA.
Paris, France-Loisirs/Fayard, 1981. grand in-8°, 297 pp, cartonnage ed. avec jaquette illustree.
Bookseller reference : 15361
|
|
BAR-ZOHAR, Michel.
LA 28° ENIGMA.
grand in-8°, 297 pp, cartonnage ed. avec jaquette illustree. Leger accroc a la jaquette sinon bel exemplaire. [NV-4]
|
|
Beckett (Brian) - Philippe Béguin, Philippe Klein et Eric Hénault, eds.
Introduction aux méthodes de cryptologie (Cryptographie), traduit de l'anglais par Philippe Béguin, Philippe Klein et Eric Hénault , dans la collection Logique, Mathématiques, Informatique
Masson , Logique, Mathématiques, Informatique Malicorne sur Sarthe, 72, Pays de la Loire, France 1990 Book condition, Etat : Bon relié, cartonnage éditeur imprimé rose, titre en violet grand In-8 1 vol. - 344 pages
Bookseller reference : Cyb-7200
|
|
BEESLY Patrick
Room 40. British Naval Intelligence 1914-1918. BRIGHT, CLEAN COPY IN UNCLIPPED DUSTWRAPPER
8vo., First Edition, with 23 plates on 16 and 5 maps (one double-page) in the text, page edges tanned as usual; original black cloth, backstrip lettered in silver, a very good, clean copy in unclipped dustwrapper, the latter mildly sunned at backstrip. The story of Reginald Hall's famous Room 40, the Admiralty's codebreaking organisation during the Great War. Like its WWII successor at Bletchley, it was successful in breaking and manipulating German naval and diplomatic codes, and its achievements had a profound effect on the outcome of the conflict. ALREADY SCARCE IN THIS CONDITION
|
|
BENNETT C. H. + G. BRASSARD + S. BREIDBART. + WIESNER S. + DAVID CHAUM. THE CREATION OF QUANTUM CRYPTOGRAPHY AND THE BITCOIN
Quantum Cryptography or Unforgeable Subway Tokens Bennett et al. Blind Signatures for Untraceable Payments David Chaum.
New York & London Plenum Press 1982. 8vo. In the original printed full cloth. In "Advances in Cryptology Proceedings of Crypto 82". Small label pasted on to lower part of spine and library label pasted on to pasted down front free end paper and small stamp to title page. Otherwise a fine copy. Pp. 267-275; Pp. 199-203. � First appearance of these two seminal landmark papers constituting the birth of Quantum Cryptography and secure digital cash payments. <br><br>In "Quantum cryptography or unforgeable subway tokens" Bennett and Brassard not only coined the term "Quamtum Cryptography" they also initiated a completely new and revoluzionizing branch of cryptography<br>"In 1982 Bennett Brassard Breitbart and Wiesner joined forces to publish "Quantum cryptography or unforgeable subway tokens" which luckily found acceptance leading to the by now vast eld of research in quantum key distribution QKD. Quantum key distribution<br>allows two remote parties who are only connected via a quantum channel to generate an arbitrarily long secret key that they can then use to perfectly shield their messages from prying eyes. The idea is beautiful in its simplicity: unlike with classical data quantum mechanics prevents us from copying an unknown quantum state. What's more is that any attempt to extract information from such a state can be detected! That is we can now determine whether an eavesdropper has been trying to intercept our secrets." Wehner Quantum Cryptography P. 1. <br><br>"Quantum cryptography is based on the properties of photons. It exploits those properties to generate a string of random bits that's used as a one-time pad. Encryption can be done either with photons using this pad as a key or with any polyalphabetic method again using the one-time pad as the key. The point is that the bits of the key can be generated by the sender Alice and securely send to the receiver Bob by means of photons. Any eavesdropper trying to intercept and decode the stream must damage it in a way that's easy for Bob and Alice to detect." Salomon Data Privacy and Security P. 235.<br><br>In "Blind signatures for untraceable payments" David Chaum invented secure digital cash and introduced the cryptographic primitive of a blind signature. These ideas formed the technical roots of the vision of the Cypherpunk movement that began in the late 1980s and later led directly to the creation of the Bitcoin currency. Chaum's proposal allowed users to obtain digital currency from a bank and spend it in a manner that is untraceable by the bank or any other party. hardcover
Bookseller reference : 49698
|
|
BRIGGS Asa
Secret Days. Code-breaking in Bletchley Park. FINE COPY IN UNCLIPPED DUSTWRAPPER
8vo., First Edition, with 19 coloured plates on 8 and 42 monochrome plates on 16; black cloth, gilt back, a fine copy in unclipped dustwrapper. Lord Briggs worked for five years in Hut Six alongside Turing and Welchman. A particularly well-illustrated memoir.
|
|
BUDIANSKY Stephen
Battle of Wits. The Complete Story of Codebreaking in World War II. NEAR FINE COPY IN UNCLIPPED DUSTWRAPPER
8vo., First Edition, with plates; black cloth, gilt back, a near fine copy in unclipped dustwrapper. With personal bookplate on front free endpaper.
|
|
Ceillier (Rémi)
La cryptographie - n° 116 de cette collection Que-Sais-je ?
Presses Universitaires de France - P.U.F. , Que Sais-Je ? , Que Sais-je ? Malicorne sur Sarthe, 72, Pays de la Loire, France 1958 Book condition, Etat : Bon broché, sous couverture imprimée éditeur blanche et violet In-8 1 vol. - 136 pages
Bookseller reference : Cyb-7058
|
|
Claudio Foti
Il Codice Voynich.
Un volume di 171 pagine, brossura editoriale. Dimensioni: 15x21 cm. Ottime condizioni. Illustrazioni in b/n nel testo, VIII tavole a colori fuori testo.
|
|
Cole (Eric) - David de Loenzien (traduction)
Hackers attention danger ! , dans la collection Référence - Systèmes et Réseaux (Hacking - Piratage informatique), traduit de l'américain par David de Loenzien
Campus Press , Référence - Systèmes et Réseaux Malicorne sur Sarthe, 72, Pays de la Loire, France 2001 Book condition, Etat : Bon broché, sous couverture imprimée éditeur bleu et blanche, illustrée d'une photographie floutée d'une personne dans les tons rouge petit In-4 épais 1 vol. - 795 pages
Bookseller reference : Cyb-6131
|
|
Collectif
QUE SAIS- JE ?
QUE SAIS- JE ? PUF éditeur 34 volumes in 12 brochés. 1941 – 1956. 125 pages en moyenne, illustrations, cartes et plans pour certains volumes. L’ensemble en état correct. n° 2 1942)- 4 -9 -16 -35- 53- 59 -61- 62- 70- 73- 80- 89- 93- 105- 116- 140- 208- 233 – 255- 26-7 268- 273- 319 -368- 377- 381- 416- 453 494- 540 -569- 717 – 721- (1956)
Bookseller reference : 12815
|
|
Committee to Study National Cryptography Policy Computer Science and Telecommunications Board Division on Engineering and Phys
Cryptography's Role in Securing the Information Society
National Academies Press. Used - Very Good. Former Library book. Great condition for a used book! Minimal wear. National Academies Press unknown
Bookseller reference : GRP13472858 ISBN : 0309054753 9780309054751
|
|
Computer Science and Telecommunications Board Staff; Study National Cryptography Policy Committee
Cryptography's Role in Securing the Information Society
National Academies Press 1996. Hardcover. Good. Disclaimer:A copy that has been read but remains in clean condition. All pages are intact and the cover is intact. The spine may show signs of wear. Pages can include limited notes and highlighting and the copy can include previous owner inscriptions. At ThriftBooks our motto is: Read More Spend Less.Dust jacket quality is not guaranteed. National Academies Press hardcover
Bookseller reference : G0309054753I3N00 ISBN : 0309054753 9780309054751
|
|
Cornélien (David)
Le grand livre des codes secrets - Percez les codes, décryptez les messages et devenez un vrai espion (Cryptographie, décryptement)
Editions Marabout Malicorne sur Sarthe, 72, Pays de la Loire, France 2010 Book condition, Etat : Bon relié, cartonnage éditeur noir, marron et gris, illustré d'une figure avec un cerveau rose avec un trou de serrure grand In-8 1 vol. - 344 pages
Bookseller reference : Cyb-6818
|
|
DEVOS J.P. & SELIGMAN H. (eds.)
L'art de déschiffrer. Traité de déchiffrement du XVIIe siècle de la Secrétairerie d'Etat et de Guerre Espagnole
Louvain, Bureaux du Recueil - Bibliothèque de l'Université / Publications Universitaires de Louvain 1967 xvi + 99pp., 25cm., dans la série "Université de Louvain. Recueil de travaux publiés par les membres des conférences d'histoire et de philologie" 4e série fasc.36, br.orig., non coupé, bel état, T74354
Bookseller reference : T74354
|
|
DEVOS J.P. & SELIGMAN H. (eds.)
L'art de déschiffrer. Traité de déchiffrement du XVIIe siècle de la Secrétairerie d'Etat et de Guerre Espagnole
xvi + 99pp., 25cm., dans la série "Université de Louvain. Recueil de travaux publiés par les membres des conférences d'histoire et de philologie" 4e série fasc.36, br.orig., non coupé, bel état, T74354
|
|
drosnin ( michael )
la bible : le code secret
laffont 1997 in 8 broché 280 pages
Bookseller reference : 437
|
|
Fletcher PRATT
HISTOIRE de la CRYPTOGRAPHIE
Un ouvrage de 302 pages, format 140 x 230 mm, broché, publié en 1940, Payot, collection "Bibliothèque Historique", bon état
Bookseller reference : LFA-126723201
|
|
GOMEZ Joan
Codage et cryptographie
Cédric Villani.2013.In-8,cartonnage éditeur.Etat neuf.
Bookseller reference : 49266
|
|
GRAVESANDE (Guillaume-Jacob s') et [Élie de JONCOURT]
Introduction à philosophie,. Contenant la métaphysique, et la logique... traduite du Latin.
Leyde, J. & H. Verbeek, 1748. in-12, 4ff.n.ch.-472 pages. Reliure de l'époque veau brun granité, dos lisse orné de filets dorés formant caissons, fleurettes, palmettes et petits fers dorés, tranches rouges.
Bookseller reference : 32109
|
|
HARRIS, Robert.
ENIGMA. Roman.
Paris, Plon, 1996. in-8°, 319 pages, broche, couverture illustree plastifiee.
Bookseller reference : 31594
|
|
HARRIS, Robert.
ENIGMA. Roman.
in-8°, 319 pages, broche, couverture illustree plastifiee. Bel exemplaire. [CA30-5] Ce roman met en scène le Capitaine Hornblower.
|
|
HINSLEY et al F. H.
British Intelligence in the Second World War. Its Influence on Strategy and Operations. [Complete set.]. FINE SET IN UNCLIPPED DUSTWRAPPERS
5 vols. in 6., roy. 8vo., First Edition, with coloured endpaper maps; green cloth, gilt backs, a fine set in unclipped dustwrapper. Published in the UK government's official series 'The History of the Second World War'. The complete set comprises Vol. I (1979), Vol. 2 (1981), Vol. 3 Part 1 (1984), Vol. 3 Part 2 (1988), Vol. 4: Security and Counter-Intelligence (1990) and Vol. 5: Strategic Deception (1990). Contributors include E E Thomas, CFG Ransom, RC Knight, CAG Simkins and Michael Howard, INCREASINGLY SCARCE AS SET, ESPECIALLY IN THIS CONDITION.
|
|
HINSLEY F.H
Codebreakers. The Inside Story of Bletchley Park.
8vo., First Edition, with diagrams in the text; black cloth, gilt back, a near fine copy in price-clipped dustwrapper.
|
|
Huff P.J., Lewin J.G.
CODICI SEGRETI. Storie, misteri, operazioni, personaggi. Tutte le tecniche per decrittare o trasmettere messaggi cifrati.
(Codice CW/7790) In 8º (21,5 cm) 275 pp. Con numerose illustrazioni. Ampio indice analitico. Cartone editoriale, sovraccoperta. COME NUOVO. ~~~ SPEDIZIONE IN ITALIA SEMPRE TRACCIATA
|
|
HUMPICH, Serge.
Le Cerveau bleu.
Document. S.l., XO Editions, 2001. in-8°, 212 pages, broche, couverture illustree plast.- 9782845630390
Bookseller reference : 10261
|
|
HUMPICH, Serge.
Le Cerveau bleu.
in-8°, 212 pages, broche, couverture illustree plast.- 9782845630390 Bel exemplaire [CA31] Coupable d’avoir percé le secret de la carte bancaire.
|
|
Laffin (John)
Petit code des codes secrets (codes et chiffres).
français In-8 de 157 pp.; broché à rabats de l'éditeur. Illustré de 12 pages hors texte.
|
|
LANGE (André) et SOUDART (E.-A.).-
Traité de Cryptographie. Ouvrage orné d'un frontispice et de 100 tableaux et illustrations dans le texte.
P., Alcan, 1925, grand in 8° broché, XII-366-VI pages ; couverture légèrement fanée.
Bookseller reference : 34837
|
|
LANGE ANDRE' SOUDART E.A.
Traité de cryptographie.
In 8°, brossura editoriale, pp. (6), XII, 366, II, bruniture alla brossura, ma buon esemplare. (ZB7) (ZB7)
|
|
LEDIT, Guillaume - TESQUET, Olivier
Dans la tête de Julian Assange
2020 Editions Solin / Actes Sud, Collection "Essai" - 2020 - In-8, broché, couverture illustrée - 215 p.
Bookseller reference : 107600
|
|
LERVILLE, Edmond
LES CAHIERS SECRETS DE LA CRYPTOGRAPHIE : le chiffre dans l'histoire, des histoires du chiffre
[Monaco] : Éditions du Rocher, 1972. In-8 (24 cm), couverture souple à rabats imprimés, illustrations en noir, 318 pages, 452 gr.
Bookseller reference : 05280
|
|
Lervile Edmond
les cahiers secrets de la cryptographie Le Chiffre dans l'histoire de histoires du chiffre.
Editions du Rocher, 1972 - In-8°, broché, couverture noire pelliculée rempliée, 316 pages - Propre. Léger dé pelliculage en bas de premier plat (voir cliché).
Bookseller reference : 18547
|
|
LERVILLE (Edmond )
LES CAHIERS SECRETS DE LA CRYPTOGRAPHIE. Le chiffre dans l'histoire des histoires du chiffre
Monaco, Editions du Rocher, 1972. In-8, broché, 318 pages. Edition originale.
Bookseller reference : 18775
|
|
LERVILLE, Edmond.
Les Cahiers secrets de la Cryptographie. Le chiffre dans l'histoire des histoires du chiffre.
Monaco, Editions du Rocher, 1972. grand in-8°, 318 pp., fig. et tabl. in-t., biblio, index, broche, couverture illustree plastifiee à rabats.
Bookseller reference : 19236
|
|
LERVILLE, Edmond.
Les Cahiers secrets de la Cryptographie. Le chiffre dans l'histoire des histoires du chiffre.
grand in-8°, 318 pp., fig. et tabl. in-t., biblio, index, broche, couverture illustree plastifiee à rabats. Bel exemplaire. [SC-2]
|
|
Lloyd, Emlyn, Steven Vajda u.a. (Ed.) and Chief Editor Walter Ledermann
Handbook of Applicable Mathematics: Supplement.
Chichester, New York u.a., John Wiley, 1990. XIX, 479 S. (25,5 cm) Leinen mit Umschlag / gebundene Ausgabe
Bookseller reference : 10370 ISBN : 471918253
|
|
MARKS Leo
Between Silk and Cyanide. The Story of SOE's Code War. [Third Impression]. NEAR FINE COPY IN UNCLIPPED DUSTWRAPPER
8vo., Third Impression, with 19 plates on 8 and numerous figures in the text; cloth, gilt back, a very good, bright, clean copy in unclipped dustwrapper. Published in the same year as the first edition. Classic and long-awaited account of SOE cryptography by a legendary wartime expert. Marks wrote the famous poem 'The Life that I have' which he subsequently gave to Violette Szabo as her code key, and discloses here for the first time the story of the code war between SOE and the enemy in Holland. After WWII, Marks went on to become a prize-winning scriptwriter (he wrote Michael Powell's cult classic feature film 'Peeping Tom').
|
|
MCKAY Sinclair
The Secret Listeners. How the Y Service intercepted German Codes for Bletchley Park. FINE COPY IN UNCLIPPED DUSTWRAPPER
8vo., First Edition, with plates and a double-page map in the text; red cloth, backstrip lettered in silver, a fine copy in unclipped dustwrapper. ALREADY VERY SCARCE, ESPECIALLY IN IN THIS CONDITION.
|
|
McKAY Sinclair
The Spies of Winter. The GCHQ Codebreakers who fought the Cold War. NEAR FINE COPY IN UNCLIPPED DUSTWRAPPER
8vo., First Edition, with plates; black cloth, backstrip lettered in silver, blue endpapers, a near fine copy in unclipped dustwrapper.
|
|
Meat Packing. Cryptography
The Armour-Cudahy Packing Company South Omaha Neb. Telegraphic Cipher Book
Omaha: Ackermann Bros. & Heintze 1888. Very good. 6112pp. 16mo. Original cloth. Light wear to cloth at edges and corners; boards slightly rubbed. Contemporary ink stamp on front pastedown; slightly later bookplate on front free endpaper. Light tanning and dust soiling internally. A fascinating and unrecorded book of ciphers used in telegraphic communications by the Armour-Cudahy Packing Company "compiled exclusively for use between them and their agents and brokers." The company was founded in South Omaha adjacent to the Omaha Stockyards in 1887 by Michael Cudahy and Philip Armour. It operated for four years and became one of the "big four" packing companies in Omaha before Cudahy bought out Armour in 1891 and it became simply the Cudahy Packing Company. By the mid-20th century their plant occupied five square blocks between the stockyards and the South Omaha Terminal Railway.The present book contains thousands of code words for sales phrases types of meat weights and measures prices and other notes on shipments payments and markets. Sections are organized alphabetically -- the most basic and important code words for sales consignments and orders all begin with "A" for example. Words for times and numbers start with "B" while codes plain prices begin with "C." Words for all manner of meat products in differing amounts occupy "D" through "P." Perhaps our favorite term here is "Rescue" which translates to "Meat a little soft otherwise good." Overall an excellent document of the evidently serious world of meat packing cryptography in the late 19th century. Not in OCLC. Ackermann Bros. & Heintze unknown books
Bookseller reference : 1778
|
|
PAILLOLE, P.
Notre espion chez Hitler.
in-8, 285 pp., ill. h.t. n., broché. Bon état. [BL-10] Pendant dix ans, l’allemand Hans Thilo Schmidt a livré à la France et aux alliés les secrets de la machine Enigma et de la stratégie hitlérienne.
|
|
Pentagram Press Cryptography No Authors Indicated
Cipher
No Place: Pentagram No Date. First edition. Hardcover. Fine/fine. 16mo. Stiff cardboard wrappers in elaborate die-cut thick cardboard dustwrapper. An artist / design book on the art of cryptography. Fine condition. Publisher sheet laid in. Pentagram hardcover
Bookseller reference : 29671
|
|
PRATT, Fletcher.
Histoire de la Cryptographie. Les écritures secrètes depuis l’Antiquité à nos jours. Collection Bibliothèque historique.
Paris, Payot 1940, 228x143mm, 296pages, broché. Bel exemplaire.
Bookseller reference : 69086
|
|
Preneel, Bart; Govaerts, Rene & Vandewalle, Joos (eds.)
Computer Security and Industrial Cryptography: State of the Art and Evolution ESATCourse Leuven, Belgium, May 21 - 23, 1991 (Lecture Notes in Computer Science 741)
Lecture Notes in Computer Science 741; Ex - Library. Previous owner's sticker on the front cover. Ink stamp on half - title page. Library catalogue sticker inside front cover. Faintly bumped spine head and rubbed corners. Foot of page block slightly grubby and marked due to age. Sound, clean book with tight binding. ADG. Ex - Library
|
|
RHOER Edward Van Der
Deadly Magic. A Personal Account of Communications Intelligence in World War II in the Pacific. [First UK Edition.] NEAR FINE COPY IN DUSTWRAPPER
8vo., First Edition thus, with photographs in the text; black cloth, backstrip lettered in silver, a near fine copy in price-clipped dustwrapper. The success of American codebreakers in reading the messages of the Japanese armed forces and diplomatic service.
|
|
RHOER Edward Van Der
Deadly Magic. A Personal Account of Communications Intelligence in World War II in the Pacific. NEAR FINE COPY IN UNCLIPPED DUSTWRAPPER
8vo., First Edition, with photographs in the text; black cloth, backstrip lettered in silver and red, a near fine copy in unclipped, mildly rubbed dustwrapper. The success of American codebreakers in reading the messages of the Japanese armed forces and diplomatic service.
|
|