Data Integration for Medical Information Management
Journal of VLSI Signal Processing Systems
High-speed & Low Area Hardware Architectures of the Whirlpool Hash Function
Journal of VLSI Signal Processing Systems
Efficient video encryption scheme based on advanced video coding
Multimedia Tools and Applications
Cryptography Adapted to the New European Area of Higher Education
ICCS '08 Proceedings of the 8th international conference on Computational Science, Part II
The communication unit for remote data acquisition via the internet
CSECS'08 Proceedings of the 7th conference on Circuits, systems, electronics, control and signal processing
The communication unit of measuring device in power engineering
WSEAS TRANSACTIONS on COMMUNICATIONS
Analysis of the efficiency of the Chor-Rivest cryptosystem implementation in a safe-parameter range
Information Sciences: an International Journal
Bit-oriented generators for Wireless Sensor Networks and low cost RFID transponders
ACST '08 Proceedings of the Fourth IASTED International Conference on Advances in Computer Science and Technology
Introducing cryptography course in computer science undergraduate curricula
Proceedings of the 48th Annual Southeast Regional Conference
Maple implementation of the chor-rivest cryptosystem
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part II
Rethinking Stream Ciphers: Can Extracting be Better than Expanding?
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
From the Publisher:An Introduction to Cryptography is intended for the person wanting an introduction to the subject of cryptography, however, it contains enough advanced, optional material to challenge even the informed reader." "Beginning with an overview of the history of cryptography, the author then covers the basics of computer arithmetic and explores complexity. The author then presents comprehensive information on symmetric-key cryptosystems, public-key cryptosystems, and primality testing. He illustrates all methods with worked examples and includes a full description of the numerous cryptographic applications.