Sold Out
Book Categories |
Introduction. Cryptographic Systems. Unkeyed Cryptosystems - One-Way Functions. Cryptographic Hash Functions. Random Bit Generators. Secret Key Crytosystems - Symmetric Encryption Systems. Message Authentication Codes. Pseudo-Random Bit Generators. Pseudo-Random Functions. Public Key Cryptosystems - Asymmetric Encryption Systems. Digital Signature Systems. Key Establishment. Entity Authentication. Secure Multiparty Computation . Epilogue - Key Management. Conclusions. Outlook. Appendixes - Discrete Mathematics. Probability Theory. Information Theory. Complexity Theory. Abbreviations and Acronyms. Mathematical Notation. About the Author.
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionContemporary Cryptography
X
This Item is in Your InventoryContemporary Cryptography
X
You must be logged in to review the productsX
X
X
Add Contemporary Cryptography, Whether you're new to the field or looking to broaden your knowledge of contemporary cryptography, this newly revised edition of an Artech House classic puts all aspects of this important topic into perspective. Delivering an accurate introduction to the , Contemporary Cryptography to the inventory that you are selling on WonderClubX
X
Add Contemporary Cryptography, Whether you're new to the field or looking to broaden your knowledge of contemporary cryptography, this newly revised edition of an Artech House classic puts all aspects of this important topic into perspective. Delivering an accurate introduction to the , Contemporary Cryptography to your collection on WonderClub |