Sold Out
Book Categories |
Ch. 1 | Classical Two-Way Cryptography | 1 |
Ch. 2 | The Idea of Public Keys | 55 |
Ch. 3 | Knapsack Systems | 77 |
Ch. 4 | RSA | 125 |
Ch. 5 | Other Bases of Cryptosystems | 159 |
Ch. 6 | Cryptographic Protocols: Surprising Vistas for Communication | 181 |
App. A | Tutorial in Complexity Theory | 245 |
App. B | D Tutorial in Number Theory | 249 |
Problems | 255 | |
Historical and Bibliographical Remarks | 263 | |
References | 265 | |
Index | 269 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionPublic-Key Cryptography
X
This Item is in Your InventoryPublic-Key Cryptography
X
You must be logged in to review the productsX
X
X
Add Public-Key Cryptography, Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essen, Public-Key Cryptography to the inventory that you are selling on WonderClubX
X
Add Public-Key Cryptography, Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essen, Public-Key Cryptography to your collection on WonderClub |