Hugendubel.info - Die B2B Online-Buchhandlung 

Merkliste
Die Merkliste ist leer.
Bitte warten - die Druckansicht der Seite wird vorbereitet.
Der Druckdialog öffnet sich, sobald die Seite vollständig geladen wurde.
Sollte die Druckvorschau unvollständig sein, bitte schliessen und "Erneut drucken" wählen.

A Brief History of Cryptology and Cryptographic Algorithms

BuchKartoniert, Paperback
99 Seiten
Englisch
Springererschienen am15.10.20132013
For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. Yet for every system there is a cryptanalyst creating a new technique to break that system.mehr
Verfügbare Formate
BuchKartoniert, Paperback
EUR53,49
E-BookPDF1 - PDF WatermarkE-Book
EUR53,49

Produkt

KlappentextFor over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. Yet for every system there is a cryptanalyst creating a new technique to break that system.
Zusammenfassung
Traces the history of the conflict between cryptographer and cryptanalyst

Explores in some depth the algorithms created to protect messages

Suggests where the field of cryptology is going in the future
Details
ISBN/GTIN978-3-319-01627-6
ProduktartBuch
EinbandartKartoniert, Paperback
Verlag
Erscheinungsjahr2013
Erscheinungsdatum15.10.2013
Auflage2013
Seiten99 Seiten
SpracheEnglisch
Gewicht196 g
IllustrationenXII, 99 p. 33 illus.
Artikel-Nr.29465244

Inhalt/Kritik

Inhaltsverzeichnis
Introduction: A Revolutionary Cipher.- Cryptology Before 1500: A Bit of Magic.- The Black Chambers: 1500 - 1776.- Crypto goes to War: 1861 - 1865.- Crypto and the War to End All Wars: 1914 - 1917.- The Interwar Period: 1919 - 1939.- The Coming of the Machines: 1918 - 1945.- The Machines Take Over: Computer Cryptography.- Alice and Bob and Whit and Martin: Public Key Crypto.mehr
Kritik
From the reviews:
"The primary value of the work is for those interested in the development of DES and AES, or for those working on the key exchange issue, which lies at the heart of the RSA algorithm. It will also be useful for readers who might want to use it as a text in computer security courses, especially since that is how the author intended it in the first place." (G. Mick Smith, Computer Reviews, March, 2014)
mehr

Schlagworte