Tutorial: Cryptography and data security
Part of the Lecture Notes in Computer Science book series (LNCS, volume 381)
Chapter 5 Cryptography
- 106 Downloads
KeywordsEncryption Method Secure Channel Oblivious Transfer Legal User Decryption Method
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Unable to display preview. Download preview PDF.
Some useful books
- D.E. Denning. Cryptography and Data Security. Reading, Mass.: Addison-Wesley (1982). Concentrates on various aspects of data security.Google Scholar
- H.F. Gaines. Cryptanalysis. New York: Dover Publications (1939). A classic on cryptanalysis.Google Scholar
- D. Kahn. The Codebreakers: The Story of Secret Writing. New York: Macmillan (1967). The Bible of classical cryptography.Google Scholar
© Springer-Verlag Berlin Heidelberg 1989