Modern cryptography : applied mathematics for encryption and information security /
Easttom, Chuck,
Modern cryptography : applied mathematics for encryption and information security / Chuck Easttom. - xix, 394 pages ; 23 cm
computer bookfair2016
Includes bibliographical references and index.
Section I: Foundations Chapter 1: History of Cryptography to the 1800's Chapter 2: History of Cryptography from the 1800's Chapter 3: Basic Information Theory Chapter 4: Essential Number Theory and Discrete Math Chapter 5: Essential Algebra Section II: Symmetric Ciphers and Hashes Chapter 6: Feistel Networks Chapter 7: Substitution-Permutation Networks Chapter 8: S-Box Design Chapter 9: Cryptographic Hashes Section III: Asymmetric Ciphers Chapter 10: Common Algorithms Chapter 11: ECC Section IV: Applications Chapter 12: Random Number Generators Chapter 13: SSL/TLS Chapter 14: VPNs Chapter 15: Military Applications Chapter 16: Steganography Chapter 17: Cryptanalysis Chapter 18: Cryptographic Backdoors Chapter 19: The Future of Cryptography Section V: Appendices Appendix A: Implementing Cryptography
9781259588082 (alk. paper) 1259588084 (alk. paper)
2015033200
Data encryption (Computer science)
Information networks--Security measures--Mathematics.
Computer networks--Security measures--Mathematics.
Computer security--Mathematics.
TK5102.94 / .E225 2016
005.82 / E.C.M
Modern cryptography : applied mathematics for encryption and information security / Chuck Easttom. - xix, 394 pages ; 23 cm
computer bookfair2016
Includes bibliographical references and index.
Section I: Foundations Chapter 1: History of Cryptography to the 1800's Chapter 2: History of Cryptography from the 1800's Chapter 3: Basic Information Theory Chapter 4: Essential Number Theory and Discrete Math Chapter 5: Essential Algebra Section II: Symmetric Ciphers and Hashes Chapter 6: Feistel Networks Chapter 7: Substitution-Permutation Networks Chapter 8: S-Box Design Chapter 9: Cryptographic Hashes Section III: Asymmetric Ciphers Chapter 10: Common Algorithms Chapter 11: ECC Section IV: Applications Chapter 12: Random Number Generators Chapter 13: SSL/TLS Chapter 14: VPNs Chapter 15: Military Applications Chapter 16: Steganography Chapter 17: Cryptanalysis Chapter 18: Cryptographic Backdoors Chapter 19: The Future of Cryptography Section V: Appendices Appendix A: Implementing Cryptography
9781259588082 (alk. paper) 1259588084 (alk. paper)
2015033200
Data encryption (Computer science)
Information networks--Security measures--Mathematics.
Computer networks--Security measures--Mathematics.
Computer security--Mathematics.
TK5102.94 / .E225 2016
005.82 / E.C.M