Sold Out
Book Categories |
Pt. I | Cryptography | 1 |
1 | Introductory Synopsis | 8 |
2 | Aims and Methods of Cryptography | 25 |
3 | Encryption Steps: Simple Substitution | 42 |
4 | Encryption Steps: Polygraphic Substitution and Coding | 56 |
5 | Encryption Steps: Linear Substitution | 78 |
6 | Encryption Steps: Transposition | 91 |
7 | Polyalphabetic Encryption: Families of Alphabets | 101 |
8 | Polyalphabetic Encryption: Keys | 126 |
9 | Composition of Classes of Methods | 155 |
10 | Open Encryption Key Systems | 179 |
11 | Encryption Security | 197 |
Pt. II | Cryptanalysis | 217 |
12 | Exhausting Combinatorial Complexity | 220 |
13 | Anatomy of Language: Patterns | 235 |
14 | Polyalphabetic Case: Probable Words | 251 |
15 | Anatomy of Language: Frequencies | 271 |
16 | Kappa and Chi | 301 |
17 | Periodicity Examination | 311 |
18 | Alignment of Accompanying Alphabets | 331 |
19 | Compromises | 356 |
20 | Linear Basis Analysis | 413 |
21 | Anagramming | 418 |
22 | Concluding Remarks | 424 |
App | Axiomatic Information Theory | 439 |
Bibliography | 449 | |
Index | 453 | |
Photo Credits | 474 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionDecrypted Secrets: Methods and Maxims of Cryptology
X
This Item is in Your InventoryDecrypted Secrets: Methods and Maxims of Cryptology
X
You must be logged in to review the productsX
X
X
Add Decrypted Secrets: Methods and Maxims of Cryptology, , Decrypted Secrets: Methods and Maxims of Cryptology to the inventory that you are selling on WonderClubX
X
Add Decrypted Secrets: Methods and Maxims of Cryptology, , Decrypted Secrets: Methods and Maxims of Cryptology to your collection on WonderClub |