The author includes not only information about the most important advances in the field of cryptology of the past decade-such as the Data Encryption Standard (DES), public-key cryptology, and the RSA algorithm-but also the research results of the last three years: the Shamir, the Lagarias-Odlyzko, and the Brickell attacks on the Knapsack methods; the new Knapsack method us The author includes not only information about the most important advances in the field of cryptology of the past decade-such as the Data Encryption Standard (DES), public-key cryptology, and the RSA algorithm-but also the research results of the last three years: the Shamir, the Lagarias-Odlyzko, and the Brickell attacks on the Knapsack methods; the new Knapsack method using Galois fields by Chor and Rivest; and the recent analysis by Kaliski, Rivest, and Sherman of group-theoretic properties of the Data Encryption Standard (DES).
Mathematical Cryptology for Computer Scientists and Mathematicians
The author includes not only information about the most important advances in the field of cryptology of the past decade-such as the Data Encryption Standard (DES), public-key cryptology, and the RSA algorithm-but also the research results of the last three years: the Shamir, the Lagarias-Odlyzko, and the Brickell attacks on the Knapsack methods; the new Knapsack method us The author includes not only information about the most important advances in the field of cryptology of the past decade-such as the Data Encryption Standard (DES), public-key cryptology, and the RSA algorithm-but also the research results of the last three years: the Shamir, the Lagarias-Odlyzko, and the Brickell attacks on the Knapsack methods; the new Knapsack method using Galois fields by Chor and Rivest; and the recent analysis by Kaliski, Rivest, and Sherman of group-theoretic properties of the Data Encryption Standard (DES).
Compare
David –
Even though this 80s crypto book is dated (e.g. Knapsacks) and the examples are given in Pascal, I still have a soft spot for authors that make cryptography topics accessible from a coding perspective. Author has a good intuitive understand of many of the concepts, so this book is not just a topical rehash of what you may already have in other books.
Richard Pennock –
Somesh kaashyap –
Mark –
Sam Kowash –
Matt Salazar –
Lisa –
Chris –
Jamie –
Godfrey Waweru –
Paola D –
Mahesh Amaratunga –
Ka Cheung –
Margarita Keteva –
Adarsh –
Edwards Deming –
Peach –
Ahmed Abdelmawla –
Leo –
BookDB –
Betülözdemir –
Tomisa Starr –
Aanchal Agarwal –
Makinde Okikiola –
Merry –
Duygu Özden –
Bhabani –
Nicole –
Jadwiga –
Usman Yousouph –