Content: An overview of the subject Divisibility and modular arithmetic The evolution of codemaking until the computer era Matrices and the Hill cryptosystem The evolution of codebreaking until the computer era Representation and arithmetic of integers in different bases Block cryptosystems and the data encryption standard (DES) Some number theory and algorithms Public key cry…
Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading 1.8 Key Terms, Review Questions, and Problems Part One Symmetric Ciphers Chapter 2 Classical Encryption Techniques 2.1 Symmetric…
Contents Chapter I. Introduction to cryptology Chapter II. Classical monoalphabetic ciphers Chapter III. Classical polyalphabetic ciphers Chapter IV. Classical polygraphic ciphers Chapter V. Classical transposition ciphers Chapter VI. Stream ciphers Chapter VII. Block ciphers Chapter VIII. Public key ciphers Chapter IX. Key management, digital signatures, hash functions, and certifica…
Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview < >1.1 Computer Security Concepts < >1.2 The OSI Security Architecture < >1.3 Security Attacks < >1.4 Security Services < >1.5 Security Mechanisms < >1.6 A Model for Network Security < >1.7 Recommended Reading < >1.8 …
Tedapat bibliografi dan indeks. CONTENTS: About the Authors. Other Related Wiley
Terdapat bibliografi dan indeks. CONTENTS: 1. The Electromagnetic Model 1.1 Overview 1.2 The electromagnetic model 1.3 SI units and universal constants 2. Vector Analysis 2.1 Overview 2.2 Vector addition and subtraction 2.3 Vector multiplication 2.4 Orthogonal coordinate systems 2.5 Gradient of a scalar field 2.6 Divergence of a vector field 2.7 Divergence theorem 2.8 Curl of a vector field 2.…
1. Introduction Part I. Background: 2. Basic algorithmic number theory 3. Hash functions and MACs Part II. Algebraic Groups: 4. Preliminary remarks on algebraic groups 5. Varieties 6. Tori, LUC and XTR 7. Curves and divisor class groups 8. Rational maps on curves and divisors 9. Elliptic curves 10. Hyperelliptic curves Part III. Exponentiation, Factoring and Discrete Logarithms: 11. Basic al…
Tedapat bibliografi dan indeks. CONTENTS: About the Authors. Other Related Wiley
Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview < >1.1 Computer Security Concepts < >1.2 The OSI Security Architecture < >1.3 Security Attacks < >1.4 Security Services < >1.5 Security Mechanisms < >1.6 A Model for Network Security < >1.7 Recommended Reading < >1.8 …
Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview < >1.1 Computer Security Concepts < >1.2 The OSI Security Architecture < >1.3 Security Attacks < >1.4 Security Services < >1.5 Security Mechanisms < >1.6 A Model for Network Security < >1.7 Recommended Reading < >1.8 …