Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Modern cryptography : applied mathematics for encryption and information security /

Easttom, Chuck,

Modern cryptography : applied mathematics for encryption and information security / Chuck Easttom. - xix, 394 pages ; 23 cm

computer bookfair2016

Includes bibliographical references and index.

Section I: Foundations Chapter 1: History of Cryptography to the 1800's Chapter 2: History of Cryptography from the 1800's Chapter 3: Basic Information Theory Chapter 4: Essential Number Theory and Discrete Math Chapter 5: Essential Algebra Section II: Symmetric Ciphers and Hashes Chapter 6: Feistel Networks Chapter 7: Substitution-Permutation Networks Chapter 8: S-Box Design Chapter 9: Cryptographic Hashes Section III: Asymmetric Ciphers Chapter 10: Common Algorithms Chapter 11: ECC Section IV: Applications Chapter 12: Random Number Generators Chapter 13: SSL/TLS Chapter 14: VPNs Chapter 15: Military Applications Chapter 16: Steganography Chapter 17: Cryptanalysis Chapter 18: Cryptographic Backdoors Chapter 19: The Future of Cryptography Section V: Appendices Appendix A: Implementing Cryptography

9781259588082 (alk. paper) 1259588084 (alk. paper)

2015033200


Data encryption (Computer science)
Information networks--Security measures--Mathematics.
Computer networks--Security measures--Mathematics.
Computer security--Mathematics.

TK5102.94 / .E225 2016

005.82 / E.C.M