000 02108cam a22003858i 4500
001 18811878
003 OSt
005 20160228140043.0
008 151008s2015 nyu b 001 0 eng
010 _a 2015033200
020 _a9781259588082 (alk. paper)
020 _a1259588084 (alk. paper)
040 _aDLC
_beng
_cDLC
_erda
042 _apcc
050 0 0 _aTK5102.94
_b.E225 2016
082 0 0 _a005.82
_223
_bE.C.M
100 1 _aEasttom, Chuck,
_eauthor.
245 1 0 _aModern cryptography :
_bapplied mathematics for encryption and information security /
_cChuck Easttom.
263 _a1510
264 1 _aNew York :
_bMcGraw-Hill Education,
_c[2016]
300 _axix, 394 pages ;
_c23 cm
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
500 _acomputer bookfair2016
504 _aIncludes bibliographical references and index.
505 8 _aSection I: Foundations Chapter 1: History of Cryptography to the 1800's Chapter 2: History of Cryptography from the 1800's Chapter 3: Basic Information Theory Chapter 4: Essential Number Theory and Discrete Math Chapter 5: Essential Algebra Section II: Symmetric Ciphers and Hashes Chapter 6: Feistel Networks Chapter 7: Substitution-Permutation Networks Chapter 8: S-Box Design Chapter 9: Cryptographic Hashes Section III: Asymmetric Ciphers Chapter 10: Common Algorithms Chapter 11: ECC Section IV: Applications Chapter 12: Random Number Generators Chapter 13: SSL/TLS Chapter 14: VPNs Chapter 15: Military Applications Chapter 16: Steganography Chapter 17: Cryptanalysis Chapter 18: Cryptographic Backdoors Chapter 19: The Future of Cryptography Section V: Appendices Appendix A: Implementing Cryptography
650 0 _aData encryption (Computer science)
_916940
650 0 _aInformation networks
_xSecurity measures
_xMathematics.
650 0 _aComputer networks
_xSecurity measures
_xMathematics.
650 0 _aComputer security
_xMathematics.
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK
999 _c10560
_d10560