Computer security and cryptography

Main Author: Konheim, Alan G., 1934-
Corporate Author: Wiley-Interscience
Format: Book
Language:English
Published: Hoboken, N.J.: Wiley-Interscience, c2007
Subjects:
Online Access:http://login.proxy.eap.gr/login?url=http://dx.doi.org/10.1002/0470083980
Table of Contents:
  • CONTENTS; FOREWORD; PREFACE; ABOUT THE AUTHOR
  • CHAPTER 1 APERITIFS
  • CHAPTER 2 COLUMNAR TRANSPOSITION
  • CHAPTER 3 MONOALPHABETIC SUBSTITUTION
  • CHAPTER 4 POLYALPHABETIC SUBSTITUTION
  • CHAPTER 5 STATISTICAL TESTS
  • CHAPTER 6 THE EMERGENCE OF CIPHER MACHINES
  • CHAPTER 7 THE JAPANESE CIPHER MACHINES
  • CHAPTER 8 STREAM CIPHERS
  • CHAPTER 9 BLOCK-CIPHERS: LUCIFER, DES, AND AES
  • CHAPTER 10 THE PARADIGM OF PUBLIC KEY CRYPTOGRAPHY
  • CHAPTER 11 THE KNAPSACK CRYPTOSYSTEM
  • CHAPTER 12 THE RSA CRYPTOSYSTEM