Text
Applied cryptanalysis: breaking ciphers in the real world
Table of contents
1 Classic Ciphers 1
2 World War II Ciphers 25
3 Stream Ciphers 75
4 Block Ciphers 123
5 Hash Functions 187
6 Public Key Systems 259
7 Public Key Attacks 309
A-1 MD5 Tables
A-2 Math
A-2.1 Number Theory
A-2.2 Group Theory
A-2.3 Ring Theory
A-2.4 Linear Algebra
No other version available