Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
An Introduction to CryptographyAugust 2000
Publisher:
  • CRC Press, Inc.
  • Subs. of Times Mirror 2000 Corporate Blvd. NW Boca Raton, FL
  • United States
ISBN:978-1-58488-127-8
Published:01 August 2000
Pages:
392
Skip Bibliometrics Section
Reflects downloads up to 28 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

From the Publisher:

An Introduction to Cryptography is intended for the person wanting an introduction to the subject of cryptography, however, it contains enough advanced, optional material to challenge even the informed reader." "Beginning with an overview of the history of cryptography, the author then covers the basics of computer arithmetic and explores complexity. The author then presents comprehensive information on symmetric-key cryptosystems, public-key cryptosystems, and primality testing. He illustrates all methods with worked examples and includes a full description of the numerous cryptographic applications.

Cited By

  1. Dalal M and Juneja M (2021). A survey on information hiding using video steganography, Artificial Intelligence Review, 54:8, (5831-5895), Online publication date: 1-Dec-2021.
  2. ACM
    Narang H and Chen C Introducing cryptography course in computer science undergraduate curricula Proceedings of the 48th annual ACM Southeast Conference, (1-4)
  3. Encinas L, Masqué J and Dios A (2009). Analysis of the efficiency of the Chor-Rivest cryptosystem implementation in a safe-parameter range, Information Sciences: an International Journal, 179:24, (4219-4226), Online publication date: 1-Dec-2009.
  4. Mlynek P, Koutny M and Misurec J The communication unit for remote data acquisition via the internet Proceedings of the 7th conference on Circuits, systems, electronics, control and signal processing, (168-173)
  5. Bruen A, Wehlau D and Forcinito M (2006). Error Correcting Codes, Block Designs, Perfect Secrecy and Finite Fields, Acta Applicandae Mathematicae: an international survey journal on applying mathematics and mathematical applications, 93:1-3, (253-278), Online publication date: 1-Sep-2006.
  6. Encinas L, Masqué J and Dios A Maple implementation of the chor-rivest cryptosystem Proceedings of the 6th international conference on Computational Science - Volume Part II, (438-445)
  7. ACM
    Bender A (2006). Review of "Codes: The Guide to Secrecy from Ancient to Modern Times by Richard A. Mollin", Chapman & Hall/CRC, 2005, ACM SIGACT News, 37:1, (18-21), Online publication date: 1-Mar-2006.
  8. Sun M, Shi Y, Liu Q and Sclabassi R (2005). Data Integration for Medical Information Management, Journal of VLSI Signal Processing Systems, 41:3, (319-328), Online publication date: 1-Nov-2005.
Contributors

Recommendations