<b>Gain the skills and knowledge needed to create effective data security systems <p> This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors
Computer security and cryptography
β Scribed by Konheim, Alan G
- Publisher
- Wiley-Interscience
- Year
- 2007
- Tongue
- English
- Leaves
- 541
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Aperitifs -- Columnar transposition -- Monoalphabetic substitution -- Polyalphabetic substitution -- Statistical tests -- The emergence of cipher machines -- The Japanese cipher machines -- Stream ciphers -- Block-ciphers: Lucifer, DES, and AES -- The paradigm of public key cryptography -- The knapsack cryptosystem -- The RSA cryptosystem -- Prime numbers and factorization -- The discrete logarithm problem -- Elliptic curve cryptography -- Key exchange in a network -- Digital signatures and authentication -- Applications of cryptography -- Cryptographic patents.
β¦ Table of Contents
Aperitifs --
Columnar transposition --
Monoalphabetic substitution --
Polyalphabetic substitution --
Statistical tests --
The emergence of cipher machines --
The Japanese cipher machines --
Stream ciphers --
Block-ciphers: Lucifer, DES, and AES --
The paradigm of public key cryptography --
The knapsack cryptosystem --
The RSA cryptosystem --
Prime numbers and factorization --
The discrete logarithm problem --
Elliptic curve cryptography --
Key exchange in a network --
Digital signatures and authentication --
Applications of cryptography --
Cryptographic patents.
β¦ Subjects
Cryptographie;Datensicherung;Kryptologie;SystΓ¨mes informatiques--SΓ©curitΓ©--Mesures;Computer security;Cryptography;SysteΜmes informatiques -- SeΜcuriteΜ -- Mesures
π SIMILAR VOLUMES
Gain the skills and knowledge needed to create effective data security systemsThis book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect th
<b>Gain the skills and knowledge needed to create effective data security systems</b> <p>This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors tha
Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect t
Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a br
Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a br