The Laws of Cryptography with Java Code
by Neal R. Wagner
Publisher: Univ. of Texas San Antonio 2003
Number of pages: 334
Description:
In this book the author is trying to find a middle ground, a gentle introduction to selected topics in cryptography without avoiding the mathematics. The material is aimed at undergraduate computer science students, but will be accessible and of interest to many others.
Download or read it online for free here:
Download link
(1.1MB, PDF)
Similar books
Practical Cryptography With Go
by Kyle Isom - Leanpub
This is an introduction to cryptography for programmers; it doesn't aim to teach the theory, but rather to guide you in your attempt to understand how to use cryptography to secure your services. We'll illustrate it using the Go programming language.
(7708 views)
by Kyle Isom - Leanpub
This is an introduction to cryptography for programmers; it doesn't aim to teach the theory, but rather to guide you in your attempt to understand how to use cryptography to secure your services. We'll illustrate it using the Go programming language.
(7708 views)
Cryptography, A Study on Secret Writings
by Andre Langie - Aegean Park Press
A classic in cryptographic literature. Text is divided into parts: Descriptions of the principal systems of cryptography; Examples of deciphering (cryptanalysis); Lists and tables with bibliography; plus a section titled 'The Playfair Cipher'.
(21266 views)
by Andre Langie - Aegean Park Press
A classic in cryptographic literature. Text is divided into parts: Descriptions of the principal systems of cryptography; Examples of deciphering (cryptanalysis); Lists and tables with bibliography; plus a section titled 'The Playfair Cipher'.
(21266 views)
Mathematical Cryptology
by Keijo Ruohonen - Tampere University of Technology
These notes contain the central mathematical background needed for understanding modern data encryption methods, and introduce applications in cryptography and various protocols. The fledgling quantum cryptography is briefly introduced.
(14165 views)
by Keijo Ruohonen - Tampere University of Technology
These notes contain the central mathematical background needed for understanding modern data encryption methods, and introduce applications in cryptography and various protocols. The fledgling quantum cryptography is briefly introduced.
(14165 views)
Basic Cryptanalysis
- United States Department of the Army
Introduction to cryptanalysis, monographic, polygraphic, and polyalphabetic substitution systems, transposition systems, analysis of code systems. Text also contains exhaustive material to aid in the solution of cipher systems.
(14266 views)
- United States Department of the Army
Introduction to cryptanalysis, monographic, polygraphic, and polyalphabetic substitution systems, transposition systems, analysis of code systems. Text also contains exhaustive material to aid in the solution of cipher systems.
(14266 views)