Code Girls

Code Girls

Author: Liza Mundy

Publisher: Hachette Books

Published: 2017-10-10

Total Pages: 524

ISBN-13: 0316352551

DOWNLOAD EBOOK

The award-winning New York Times bestseller about the American women who secretly served as codebreakers during World War II--a "prodigiously researched and engrossing" (New York Times) book that "shines a light on a hidden chapter of American history" (Denver Post). Recruited by the U.S. Army and Navy from small towns and elite colleges, more than ten thousand women served as codebreakers during World War II. While their brothers and boyfriends took up arms, these women moved to Washington and learned the meticulous work of code-breaking. Their efforts shortened the war, saved countless lives, and gave them access to careers previously denied to them. A strict vow of secrecy nearly erased their efforts from history; now, through dazzling research and interviews with surviving code girls, bestselling author Liza Mundy brings to life this riveting and vital story of American courage, service, and scientific accomplishment.


Elements of Cryptanalysis

Elements of Cryptanalysis

Author: United States. War Department

Publisher:

Published: 1924

Total Pages: 180

ISBN-13:

DOWNLOAD EBOOK

"This pamphlet forms the basis of a course in military codes and ciphers given at the Signal School, Camp Alfred, N.J. by Capt. W.F. Friedman ..."--p. v.


Modern Cryptanalysis

Modern Cryptanalysis

Author: Christopher Swenson

Publisher: John Wiley & Sons

Published: 2012-06-27

Total Pages: 336

ISBN-13: 1118428625

DOWNLOAD EBOOK

As an instructor at the University of Tulsa, Christopher Swenson could find no relevant text for teaching modern cryptanalysis?so he wrote his own. This is the first book that brings the study of cryptanalysis into the 21st century. Swenson provides a foundation in traditional cryptanalysis, examines ciphers based on number theory, explores block ciphers, and teaches the basis of all modern cryptanalysis: linear and differential cryptanalysis. This time-honored weapon of warfare has become a key piece of artillery in the battle for information security.