HOME > Detail View

Detail View

Cryptography demystified

Cryptography demystified (Loan 1 times)

Material type
단행본
Personal Author
Hershey, J. E. (John E.)
Title Statement
Cryptography demystified / John E. Hershey.
Publication, Distribution, etc
New York :   McGraw-Hill,   c2003.  
Physical Medium
x, 356 p. : ill. ; 24 cm.
Series Statement
McGraw-Hill telecommunications
ISBN
0071406387 (acid-free paper)
Bibliography, Etc. Note
Includes bibliographical references and index.
Subject Added Entry-Topical Term
Cryptography. Cryptography -- Problems, exercises, etc.
000 00813pamuu2200253 a 4500
001 000000820579
005 20030715143257
008 020717s2003 nyua b 001 0 eng
010 ▼a 2029590
020 ▼a 0071406387 (acid-free paper)
040 ▼a DLC ▼c DLC ▼d YDX ▼d 211009
049 1 ▼l 121080263 ▼f 과학
050 0 0 ▼a Z103 ▼b .H46 2003
082 0 0 ▼a 005.8/2 ▼2 21
090 ▼a 005.82 ▼b H572c
100 1 ▼a Hershey, J. E. ▼q (John E.)
245 1 0 ▼a Cryptography demystified / ▼c John E. Hershey.
260 ▼a New York : ▼b McGraw-Hill, ▼c c2003.
300 ▼a x, 356 p. : ▼b ill. ; ▼c 24 cm.
440 0 ▼a McGraw-Hill telecommunications
504 ▼a Includes bibliographical references and index.
650 0 ▼a Cryptography.
650 0 ▼a Cryptography ▼v Problems, exercises, etc.

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.82 H572c Accession No. 121080263 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

Part I: INTRODUCTION TO SYMMETRIC CRYPTOGRAPHY

Module 1 First Considerations

Exercise 1

Module 2 Plaintext

Exercise 2

Module 3 Digitization of Plaintext

Exercise 3

Module 4 Toward a Cryptographic Paradigm

Exercise 4

Module 5 What We Want from the Keytext

Exercise 5

Module 6 Randomness I

Exercise 6

Module 7 Finite State Sequential Machines

Exercise 7 Transition Matrix

Module 8 m-sequences

Exercise 8

Module 9 The Paradigm Attempted

Exercise 9

Module 10 The Block Cipher Function - A Modern Keystone to the Paradigm

Exercise 10

Module 11 Confidentiality Modes: ECB and CTR

Exercise 11

Module 12 Confidentiality Mode: Output Feedback (OFB)

Exercise 12

Module 13 Confidentiality Modes: Cipher Feedback (CFB) and Cipher Block Chaining (CBC)

Exercise 13

Part II NUMBER THEORY WE WILL NEED

Module 14 Prime Numbers I

Exercise 14

Module 15 Congruences

Exercise 15

Module 16 Euler-Fermat Theorem

Exercise 16

Module 17 The Euler Phi (f) Function

Exercise 17

Module 18 The Binary Exponentiation Algorithm

Exercise 18

Module 19 The Extended Euclidean Algorithm

Exercise 19

Module 20 Primitive Roots

Exercise 20

Module 21 Chinese Remainder Theorem

Exercise 21

Part III INTRODUCTION TO PUBLIC KEY CRYPTOGRAPHY

Module 22 Merkle's Puzzle

Exercise 22

Module 23 The Diffie-Hellman Public Key Cryptographic System

Exercise 23

Module 24 Split Search

Exercise 24

Module 25 A Variant of the Diffie-Hellman System

Exercise 25

Module 26 The RSA Public Key Cryptographic System

Exercise 26

Module 27 Prime Numbers II

Exercise 27

Part IV KEYING VARIABLES

Module 28 Keying Variable Distribution

Exercise 28

Module 29 Secret Sharing

Exercise 29

Module 30 Randomness II

Exercise 30

Module 31 Cryptovariables

Exercise 31

Part V CRYPTO-OBSOLESCENCE

Module 32 The Aging Cryptoalgorithm

Exercise 32

Module 33 SUPERDES(tm)

Exercise 33

Part VI CHANNEL-BASED CRYPTOGRAPHY

Module 34 The Channel Is the Cryptovariable

Exercise 34

Module 35 The Quantum Cryptographic Channel

Exercise 35

Answers to Exercises

Glossary

Index


Information Provided By: : Aladin

New Arrivals Books in Related Fields