Cryptography and C Guide - Resources and Review

Numerous links to resources about the economics of the Internet, information goods, intellectual property and related issues such as security, privacy and cryptography.
 
Articles on codebreaking and making, encryption on the Web, the mechanics of the Nazi's encoder, Enigma, and the personalities and genius of the men who cracked its code. Contains activity sheets for teachers, and facilities for users to encode their own messages.
 
Information on Alan Turing (1912
1954), covering his work as a mathematician, philosopher, codebreaker, and early computer scientist.
 
A non
profit civil liberties organisation working in the public interest to protect privacy, free expression, and access to public resources and information online, as well as to promote responsibility in new media.
 
Article on the German mechanical cipher machine known as Enigma. Covers its history, and documents work carried out to break its code at Bletcheley Park during World War II, much of which involved Alan Turing. The paper also includes a C program which simulates Enigma.
 
Report covering issues such as authentication, authorisation, privacy and cryptography on the Web, as well as Netscape's Secure Socket Layer (SSL) and Pretty Good Privacy (PGP).
 
Set of online articles on the development of non
secret encryption. CESG is a Civil Service which aims to keep official IT and communications systems safe from compromise and is the UK technical authority for the official use of cryptography.
 
Resource providing a selection of answers to frequently asked questions about Web security, an overview of security activities at the World Wide Web Consortium (W3C), and sections on security protocols and standards, electronic commerce and cryptography.
 
Index to electronic commerce resources, covering advertising on the World Wide Web, intellectual property, security, journals, filtering, legal cases, computer crime and cryptography.
 
Journal which presents research at the interface between mathematics and theoretical computer science, with a clear mathematical profile and strictly mathematical format. Specific areas of concentration include structure of complexity classes, algebraic complexity, cryptography, interactive proofs, complexity issues in: computational geometry, robotics, and motion planning, learning theory, number theory, logic, combinatorial optimisation and approximate solutions, and distributed computing.
 
Information about the campaign to protect and promote fundamental human rights such as freedom of speech and the right of privacy on the Internet. Offers news, resources and articles on issues such as free speech, privacy, cryptography and access to information.
 
Nb = 11