𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Computer security and cryptography

✍ Scribed by Konheim, Alan G


Publisher
Wiley-Interscience
Year
2007
Tongue
English
Leaves
541
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Aperitifs -- Columnar transposition -- Monoalphabetic substitution -- Polyalphabetic substitution -- Statistical tests -- The emergence of cipher machines -- The Japanese cipher machines -- Stream ciphers -- Block-ciphers: Lucifer, DES, and AES -- The paradigm of public key cryptography -- The knapsack cryptosystem -- The RSA cryptosystem -- Prime numbers and factorization -- The discrete logarithm problem -- Elliptic curve cryptography -- Key exchange in a network -- Digital signatures and authentication -- Applications of cryptography -- Cryptographic patents.

✦ Table of Contents


Aperitifs --
Columnar transposition --
Monoalphabetic substitution --
Polyalphabetic substitution --
Statistical tests --
The emergence of cipher machines --
The Japanese cipher machines --
Stream ciphers --
Block-ciphers: Lucifer, DES, and AES --
The paradigm of public key cryptography --
The knapsack cryptosystem --
The RSA cryptosystem --
Prime numbers and factorization --
The discrete logarithm problem --
Elliptic curve cryptography --
Key exchange in a network --
Digital signatures and authentication --
Applications of cryptography --
Cryptographic patents.

✦ Subjects


Cryptographie;Datensicherung;Kryptologie;SystΓ¨mes informatiques--SΓ©curitΓ©--Mesures;Computer security;Cryptography;SysteΜ€mes informatiques -- Sécurité -- Mesures


πŸ“œ SIMILAR VOLUMES


Computer Security and Cryptography
✍ Alan G. Konheim πŸ“‚ Library πŸ“… 2007 πŸ› Wiley-Interscience 🌐 English

<b>Gain the skills and knowledge needed to create effective data security systems <p> This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors

Computer Security and Cryptography
✍ Alan G. Konheim πŸ“‚ Library πŸ“… 2007 πŸ› Wiley-Interscience 🌐 English

Gain the skills and knowledge needed to create effective data security systemsThis book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect th

Computer Security and Cryptography
✍ Alan G. Konheim πŸ“‚ Library πŸ“… 2007 πŸ› Wiley-Interscience 🌐 English

<b>Gain the skills and knowledge needed to create effective data security systems</b> <p>This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors tha

Computer Security and Cryptography
✍ Alan G. Konheim πŸ“‚ Library πŸ“… 2007 πŸ› Wiley-Interscience 🌐 English

Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect t

Computation, cryptography, and network s
✍ Daras, Nicholas J.; Rassias, Michael Th (eds.) πŸ“‚ Library πŸ“… 2015 πŸ› Springer International Publishing : Imprint: Sprin 🌐 English

Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a br

Computation, Cryptography, and Network S
✍ Nicholas J. Daras, Michael Th. Rassias (eds.) πŸ“‚ Library πŸ“… 2015 πŸ› Springer International Publishing 🌐 English

Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a br