cryptography

Type: 
Topical Term
Subfield: 
a
Alias: 
cryptography

National treasure 2

book of secrets
2008
Treasure hunter Benjamin Franklin Gates (Cage) looks to discover the truth behind the assassination of Abraham Lincoln, by uncovering the mystery within the 18 pages missing from assassin John Wilkes Booth's diary.

The kids' code and cipher book

1991
Presents a variety of codes and ciphers and includes messages to encode and decode, as part of a story.

Spies and Code Breakers

A portrait of the men and women who worked as spies and code breakers during World War II.

Navajo code talkers

America's Secret Weapon in the World War II
2002
Describes how the American military in World War II used a group of Navajo Indians to create an indecipherable code based on their native language.

Creating and cracking codes

Explores the history of cryptography and codes, discussing a variety of different kinds of codes and ciphers, as well as how codes have been used by militaries throughout the world.

The haunted lighthouse

2013
"An enigmatic message leads the Code Busters on a treasure hunt on creepy Alcatraz Island, where they must use their problem-solving skills to unravel the mystery"--Provided by publisher.

Code warriors

NSA's codebreakers and the secret intelligence war against the Soviet Union
2016
"In Code Warriors, [the author tells] how NSA came to be, from its roots in World War II through the fall of the Berlin Wall. Along the way, he guides us through the fascinating challenges faced by cryptanalysts, and how they broke some of the most complicated codes of the twentieth century. With access to new documents, Budiansky shows where the agency succeeded and failed during the Cold War, but his account also offers crucial perspective for assessing NSA today in the wake of the Edward Snowden revelations. Budiansky shows how NSA's obsession with recording every bit of data and decoding every signal is far from a new development; throughout its history the depth and breadth of the agency's reach has resulted in both remarkable successes and destructive failures"--Amazon.com.

The secret war

1998
Text and photographic essays tell of espionage in World War II.

Elementary cryptanalysis

a mathematical approach
1966

Pages

Subscribe to RSS - cryptography