Best Cryptography

Updated Daily
inventory_2 17 items
trending_up Scored across 12 criteria

Rankings are calculated based on verified user reviews, recency of updates, and community voting weighted by user reputation score.

emoji_events View Best Cryptography Rankings
Filter by Tags
0.0 10.0
Best 1 Claude Shannon
Claude Shannon

Claude Shannon is the architect of the digital age. His 1948 paper, 'A Mathematical Theory of Communication,' established the field of information theory, introducing the concept of the 'bit' as the f...

10.0 Brilliant
2 The Code Book
The Code Book

Simon Singh's 'The Code Book' traces the history of cryptography from ancient times to modern-day encryption techniques. The book provides an in-depth look at the evolution of codes and ciphers, inclu...

9.2 Excellent
Visit
3 The Code Book: The Science of Secrecy from Atbash to Quantum Cryptography
The Code Book: The Science of Secrecy from Atbash to Quantum Cryptography

Simon Singh's comprehensive guide traces the evolution of encryption from ancient ciphers to modern quantum cryptography. Explains complex concepts like public-key systems and blockchain through acces...

9.0 Excellent
Visit
4 Alan Turing
Alan Turing

Alan Turing is the foundational figure of computer science and artificial intelligence. He conceptualized the Turing Machine (1936), an abstract model of computation that defined the limits of what ca...

9.0 Excellent
Visit
5 Hedy Lamarr
Hedy Lamarr

Hedy Lamarr was an actress and inventor who co-developed a frequency-hopping spread spectrum technology during World War II. Her invention was intended to prevent the jamming of radio-controlled torpe...

8.8 Very Good
6 The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography

Simon Singhs 'The Code Book' provides a captivating history of cryptography, from ancient Egyptian hieroglyphs to modern quantum cryptography. It explains complex mathematical concepts like substituti...

8.7 Very Good
Visit
7 Codebreakers of Bletchley: Women and the Enigma Machine
Codebreakers of Bletchley: Women and the Enigma Machine

This meticulously researched biography sheds light on the often-overlooked contributions of women to the Allied war effort during World War II. Focusing on the codebreakers at Bletchley Park, it detai...

8.7 Very Good
Visit
8 Open Security Training
Open Security Training

Open Security Training offers a collection of free, in-depth courses focused on offensive security and advanced cybersecurity topics. Courses cover areas like penetration testing, reverse engineering,...

8.7 Very Good
Visit
9 GnuPG
GnuPG
Free Plan Available

GnuPG (GNU Privacy Guard) is the standard tool for OpenPGP encryption. It is widely used for securing email communications and verifying the integrity of software packages through digital signatures....

8.7 Very Good
Visit
10 OpenSSL
OpenSSL

OpenSSL is a widely used open-source library providing implementations of the SSL/TLS protocols. It's essential for secure communication over the internet, used by countless web servers and applicatio...

8.2 Very Good
Visit
11 The Imitation Game
The Imitation Game

This film tells the story of Alan Turing, the brilliant mathematician who led the team at Bletchley Park to crack the Nazi Enigma code during WWII. It is a compelling, accessible look at the intersect...

8.2 Very Good
Visit
12 Simon Singh
Simon Singh

Simon Singh is a popular science author and physicist known for his accessible explanations of complex mathematical and scientific concepts. His book *The Code Book* provides a fascinating history of...

8.1 Very Good
Visit
13 edX - MIT 6.820/6.823: Cyber Security
edX - MIT 6.820/6.823: Cyber Security

MIT offers several cybersecurity courses on edX, including 6.820 and 6.823. While a certificate requires payment, the audit option allows free access to course materials, including video lectures and...

7.7 Good
Visit
14 edX: Cybersecurity MicroMasters Program
edX: Cybersecurity MicroMasters Program

edX's Cybersecurity MicroMasters Program provides a more in-depth exploration of cybersecurity topics, building upon foundational concepts. It covers areas like network security, cryptography, and dig...

7.5 Good
Visit
15 Sophie Germain
Sophie Germain

Sophie Germain (1776-1831) overcame significant societal barriers to pursue mathematics. She made important contributions to number theory, particularly in the study of prime numbers and Fermat's Last...

7.5 Good
16 The Spy's Cipher: A Biography of Alan Turing
The Spy's Cipher: A Biography of Alan Turing

This biography by Samuel Klein revisits the life of Alan Turing, the brilliant mathematician and codebreaker who played a pivotal role in cracking the Enigma code during World War II. Klein examines T...

7.3 Good
17 Shafi Goldwasser
Shafi Goldwasser

Shafi Goldwasser is a leading researcher in cryptography and complexity theory. Her work on probabilistic encryption and zero-knowledge proofs has fundamentally changed how we think about digital secu...

7.1 Good
Visit
You've reached the end — 17 items

Save to your list

Create your first list and start tracking the tools that matter to you.

Track favorites
Get updates
Compare scores

Already have an account? Sign in

Compare Items

See how they stack up against each other

Comparing
VS
Select 1 more item to compare