Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--
Image from Google Jackets

Modern cryptography : applied mathematics for encryption and information security / Chuck Easttom.

By: Material type: TextTextPublisher: New York : McGraw-Hill Education, [2016]Description: xix, 394 pages ; 23 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781259588082 (alk. paper)
  • 1259588084 (alk. paper)
Subject(s): DDC classification:
  • 005.82 23 E.C.M
LOC classification:
  • TK5102.94 .E225 2016
Contents:
Section I: Foundations Chapter 1: History of Cryptography to the 1800's Chapter 2: History of Cryptography from the 1800's Chapter 3: Basic Information Theory Chapter 4: Essential Number Theory and Discrete Math Chapter 5: Essential Algebra Section II: Symmetric Ciphers and Hashes Chapter 6: Feistel Networks Chapter 7: Substitution-Permutation Networks Chapter 8: S-Box Design Chapter 9: Cryptographic Hashes Section III: Asymmetric Ciphers Chapter 10: Common Algorithms Chapter 11: ECC Section IV: Applications Chapter 12: Random Number Generators Chapter 13: SSL/TLS Chapter 14: VPNs Chapter 15: Military Applications Chapter 16: Steganography Chapter 17: Cryptanalysis Chapter 18: Cryptographic Backdoors Chapter 19: The Future of Cryptography Section V: Appendices Appendix A: Implementing Cryptography
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books Main library A2 Computers & Information Technology ( Computer Science ) 005.82 E.C.M (Browse shelf(Opens below)) Available 00014279

computer bookfair2016

Includes bibliographical references and index.

Section I: Foundations Chapter 1: History of Cryptography to the 1800's Chapter 2: History of Cryptography from the 1800's Chapter 3: Basic Information Theory Chapter 4: Essential Number Theory and Discrete Math Chapter 5: Essential Algebra Section II: Symmetric Ciphers and Hashes Chapter 6: Feistel Networks Chapter 7: Substitution-Permutation Networks Chapter 8: S-Box Design Chapter 9: Cryptographic Hashes Section III: Asymmetric Ciphers Chapter 10: Common Algorithms Chapter 11: ECC Section IV: Applications Chapter 12: Random Number Generators Chapter 13: SSL/TLS Chapter 14: VPNs Chapter 15: Military Applications Chapter 16: Steganography Chapter 17: Cryptanalysis Chapter 18: Cryptographic Backdoors Chapter 19: The Future of Cryptography Section V: Appendices Appendix A: Implementing Cryptography

There are no comments on this title.

to post a comment.