Sold Out
Sold Out
Book Categories |
1 | Classical polyalphabetic substitution ciphers | 9 |
2 | RSA and probabilistic prime number tests | 17 |
3 | Factorization with quantum computers : Shor's algorithm | 37 |
4 | Physical random-number generators | 47 |
5 | Pseudo-random number generators | 57 |
6 | An information theory primer | 77 |
7 | Tests for (pseudo-) random number generators | 89 |
8 | Diffie-Hellman key exchange | 107 |
9 | Differential cryptanalysis | 115 |
10 | Semantic security | 125 |
11 | Algorithmic complexity | 135 |
12 | Birthday paradox and meet-in-the-middle attack | 139 |
13 | Quantum cryptography | 145 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionProbabilistic and Statistical Methods in Cryptology
X
This Item is in Your InventoryProbabilistic and Statistical Methods in Cryptology
X
You must be logged in to review the productsX
X
X
Add Probabilistic and Statistical Methods in Cryptology, Cryptology nowadays is one of the most important areas of applied mathematics, building on deep results and methods from various areas of mathematics. This text is devoted to the study of shastic aspects of cryptology. Besides classical topics from cry, Probabilistic and Statistical Methods in Cryptology to the inventory that you are selling on WonderClubX
X
Add Probabilistic and Statistical Methods in Cryptology, Cryptology nowadays is one of the most important areas of applied mathematics, building on deep results and methods from various areas of mathematics. This text is devoted to the study of shastic aspects of cryptology. Besides classical topics from cry, Probabilistic and Statistical Methods in Cryptology to your collection on WonderClub |