Tutorial: Cryptography and data security

  • Arto Salomaa
Chapter 5 Cryptography
Part of the Lecture Notes in Computer Science book series (LNCS, volume 381)


Encryption Method Secure Channel Oblivious Transfer Legal User Decryption Method 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Some useful books

  1. D.E. Denning. Cryptography and Data Security. Reading, Mass.: Addison-Wesley (1982). Concentrates on various aspects of data security.Google Scholar
  2. H.F. Gaines. Cryptanalysis. New York: Dover Publications (1939). A classic on cryptanalysis.Google Scholar
  3. D. Kahn. The Codebreakers: The Story of Secret Writing. New York: Macmillan (1967). The Bible of classical cryptography.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1989

Authors and Affiliations

  • Arto Salomaa
    • 1
  1. 1.Mathematical DepartmentUniversity of TurkuFinland

Personalised recommendations