Computer security and cryptography
Main Author: | |
---|---|
Corporate Author: | |
Format: | Book |
Language: | English |
Published: |
Hoboken, N.J.:
Wiley-Interscience,
c2007
|
Subjects: | |
Online Access: | http://login.proxy.eap.gr/login?url=http://dx.doi.org/10.1002/0470083980 |
Table of Contents:
- CONTENTS; FOREWORD; PREFACE; ABOUT THE AUTHOR
- CHAPTER 1 APERITIFS
- CHAPTER 2 COLUMNAR TRANSPOSITION
- CHAPTER 3 MONOALPHABETIC SUBSTITUTION
- CHAPTER 4 POLYALPHABETIC SUBSTITUTION
- CHAPTER 5 STATISTICAL TESTS
- CHAPTER 6 THE EMERGENCE OF CIPHER MACHINES
- CHAPTER 7 THE JAPANESE CIPHER MACHINES
- CHAPTER 8 STREAM CIPHERS
- CHAPTER 9 BLOCK-CIPHERS: LUCIFER, DES, AND AES
- CHAPTER 10 THE PARADIGM OF PUBLIC KEY CRYPTOGRAPHY
- CHAPTER 11 THE KNAPSACK CRYPTOSYSTEM
- CHAPTER 12 THE RSA CRYPTOSYSTEM