Hot Best Seller

Mathematical Cryptology for Computer Scientists and Mathematicians

Availability: Ready to download

The author includes not only information about the most important advances in the field of cryptology of the past decade-such as the Data Encryption Standard (DES), public-key cryptology, and the RSA algorithm-but also the research results of the last three years: the Shamir, the Lagarias-Odlyzko, and the Brickell attacks on the Knapsack methods; the new Knapsack method us The author includes not only information about the most important advances in the field of cryptology of the past decade-such as the Data Encryption Standard (DES), public-key cryptology, and the RSA algorithm-but also the research results of the last three years: the Shamir, the Lagarias-Odlyzko, and the Brickell attacks on the Knapsack methods; the new Knapsack method using Galois fields by Chor and Rivest; and the recent analysis by Kaliski, Rivest, and Sherman of group-theoretic properties of the Data Encryption Standard (DES).


Compare

The author includes not only information about the most important advances in the field of cryptology of the past decade-such as the Data Encryption Standard (DES), public-key cryptology, and the RSA algorithm-but also the research results of the last three years: the Shamir, the Lagarias-Odlyzko, and the Brickell attacks on the Knapsack methods; the new Knapsack method us The author includes not only information about the most important advances in the field of cryptology of the past decade-such as the Data Encryption Standard (DES), public-key cryptology, and the RSA algorithm-but also the research results of the last three years: the Shamir, the Lagarias-Odlyzko, and the Brickell attacks on the Knapsack methods; the new Knapsack method using Galois fields by Chor and Rivest; and the recent analysis by Kaliski, Rivest, and Sherman of group-theoretic properties of the Data Encryption Standard (DES).

30 review for Mathematical Cryptology for Computer Scientists and Mathematicians

  1. 4 out of 5

    David

    Even though this 80s crypto book is dated (e.g. Knapsacks) and the examples are given in Pascal, I still have a soft spot for authors that make cryptography topics accessible from a coding perspective. Author has a good intuitive understand of many of the concepts, so this book is not just a topical rehash of what you may already have in other books.

  2. 5 out of 5

    Richard Pennock

  3. 5 out of 5

    Somesh kaashyap

  4. 4 out of 5

    Mark

  5. 5 out of 5

    Sam Kowash

  6. 5 out of 5

    Matt Salazar

  7. 5 out of 5

    Lisa

  8. 4 out of 5

    Chris

  9. 5 out of 5

    Jamie

  10. 4 out of 5

    Godfrey Waweru

  11. 4 out of 5

    Paola D

  12. 5 out of 5

    Mahesh Amaratunga

  13. 4 out of 5

    Ka Cheung

  14. 5 out of 5

    Margarita Keteva

  15. 5 out of 5

    Adarsh

  16. 5 out of 5

    Edwards Deming

  17. 5 out of 5

    Peach

  18. 4 out of 5

    Ahmed Abdelmawla

  19. 4 out of 5

    Leo

  20. 5 out of 5

    BookDB

  21. 5 out of 5

    Betülözdemir

  22. 4 out of 5

    Tomisa Starr

  23. 4 out of 5

    Aanchal Agarwal

  24. 4 out of 5

    Makinde Okikiola

  25. 5 out of 5

    Merry

  26. 4 out of 5

    Duygu Özden

  27. 4 out of 5

    Bhabani

  28. 5 out of 5

    Nicole

  29. 4 out of 5

    Jadwiga

  30. 5 out of 5

    Usman Yousouph

Add a review

Your email address will not be published. Required fields are marked *

Loading...
We use cookies to give you the best online experience. By using our website you agree to our use of cookies in accordance with our cookie policy.