Introduction to Cryptography with Open-Source Software.

Introduction to CryptographyHiding information: confidentiality Some basic definitions Attacks on a cryptosystem Some cryptographic problems Cryptographic protocols Some simple ciphers Cryptography and computer security Basic Number Theory Introduction Some basic definitions Some number theoretic ca...

Full description

Saved in:
Bibliographic Details
Main Author: McAndrew, Alasdair.
Format: eBook
Language:English
Published: Hoboken : CRC Press, 2012.
Series:Discrete mathematics and its applications.
Subjects:
Online Access:CONNECT
CONNECT
LEADER 03566cam a2200529Mu 4500
001 in00006064982
006 m o d
007 cr |n|||||||||
008 150509s2012 xx o 000 0 eng d
005 20220713133850.2
035 |a 1WRLDSHRocn908079275 
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCO  |d OCLCQ  |d IDB  |d OCLCO  |d OCLCF  |d OCLCA  |d MERUC  |d OCLCQ  |d OCLCO  |d OCLCA  |d OCLCQ  |d OTZ  |d TYFRS  |d OCLCQ  |d OCLCO 
020 |a 9781439825716 
020 |a 1439825718 
024 7 |a 10.1201/9781439825716  |2 doi 
035 |a (OCoLC)908079275 
050 4 |a QA76.9.A25 M398 2015 
082 0 4 |a 005.8/2  |a 005.82 
049 |a TXMM 
100 1 |a McAndrew, Alasdair. 
245 1 0 |a Introduction to Cryptography with Open-Source Software. 
260 |a Hoboken :  |b CRC Press,  |c 2012. 
300 |a 1 online resource (456 pages). 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Discrete Mathematics and Its Applications 
588 0 |a Print version record. 
505 0 |a Front Cover; Contents; Preface; Chapter 1. Introduction to cryptography; Chapter 2. Basic number theory; Chapter 3. Classical cryptosystems; Chapter 4. Introduction to information theory; Chapter 5. Public-key cryptosystems based on factoring; Chapter 6. Public-key cryptosystems based on logarithms and knapsacks; Chapter 7. Digital signatures; Chapter 8. Block ciphers and the data encryption standard; Chapter 9. Finite fields; Chapter 10. The Advanced Encryption Standard; Chapter 11. Hash functions; Chapter 12. Elliptic curves and cryptosystems; Chapter 13. Random numbers and stream ciphers. 
505 8 |a Chapter 14. Advanced applications and protocolsAppendix A. Introduction to Sage; Appendix B. Advanced computational number theory; Bibliography; Back Cover. 
520 |a Introduction to CryptographyHiding information: confidentiality Some basic definitions Attacks on a cryptosystem Some cryptographic problems Cryptographic protocols Some simple ciphers Cryptography and computer security Basic Number Theory Introduction Some basic definitions Some number theoretic calculations Primality testing Classical Cryptosystems Introduction The Caesar cipher Translation ciphersTransposition ciphers The Vigenère cipher The one-time pad Permutation ciphers Matrix ciphers Introduction to Information TheoryEntropy and uncertainty Perfect secrecy Estimating the entropy of Eng. 
504 |a Includes bibliographical references and index. 
590 |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) 
650 0 |a Computer security. 
650 0 |a Cryptography  |x Mathematics. 
650 0 |a Data encryption (Computer science) 
650 0 |a Open source software. 
730 0 |a WORLDSHARE SUB RECORDS 
776 0 8 |i Print version:  |a McAndrew, Alasdair.  |t Introduction to Cryptography with Open-Source Software.  |d Hoboken : CRC Press, ©2012  |z 9781439825709 
830 0 |a Discrete mathematics and its applications. 
856 4 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781439825716/?ar  |z CONNECT  |3 O'Reilly  |t 0 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi  |d z 
999 f f |s 70998d96-f780-4b96-9382-81a3bae28eb0  |i 9ef7b5a8-224d-4c09-8dc2-c7b80bd9a467  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 1  |e QA76.9.A25 M398 2015   |h Library of Congress classification 
856 4 0 |3 O'Reilly  |t 0  |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781439825716/?ar  |z CONNECT