Understanding and applying cryptography and data security / Adam J. Elbirt.
Introduction A Brief History of Cryptography and Data Security Cryptography and Data Security in the Modern World Existing Texts Book Organization Symmetric-Key Cryptography Cryptosystem Overview The Modulo Operator Greatest Common Divisor The Ring ZmHomework ProblemsSymmetric-Key Cryptography: Subs...
Saved in:
Online Access: |
Full Text (via Taylor & Francis) |
---|---|
Main Author: | |
Format: | eBook |
Language: | English |
Published: |
Boca Raton, Fla. :
CRC Press,
©2009.
|
Subjects: |
Table of Contents:
- Front cover
- Dedication
- Contents
- List of Figures
- List of Tables
- About the Author
- Acknowledgments
- Chapter 1. Introduction
- Chapter 2. Symmetric-Key Cryptography
- Chapter 3. Symmetric-Key Cryptography: Substitution Ciphers
- Chapter 4. Symmetric-Key Cryptography: Stream Ciphers
- Chapter 5. Symmetric-Key Cryptography: Block Ciphers
- Chapter 6. Public-Key Cryphotgraphy
- Chapter 7. Public-Key Cryphography: RSA
- Chapter 8. Public-Key Cryptography: Discrete Logarithms
- Chapter 9. Public-Key Cryptograhy: Elliptic Curves
- Chapter 10. Cryptographic Components
- Chapter 11. Cryptographic Protocols
- References
- Index
- Back cover.