Logo

The Laws of Cryptography with Java Code

Small book cover: The Laws of Cryptography with Java Code

The Laws of Cryptography with Java Code
by

Publisher: Univ. of Texas San Antonio
Number of pages: 334

Description:
In this book the author is trying to find a middle ground, a gentle introduction to selected topics in cryptography without avoiding the mathematics. The material is aimed at undergraduate computer science students, but will be accessible and of interest to many others.

Download or read it online for free here:
Download link
(1.1MB, PDF)

Similar books

Book cover: Public-Key Cryptography: Theory and PracticePublic-Key Cryptography: Theory and Practice
by - TU Darmstadt
Multiple aspects of public-key cryptography are examined. The author covers the theory of provably secure public-key cryptography and the implementation of exponentiation and multi-exponentiation. An introduction to provable security is provided.
(9351 views)
Book cover: Fundamentals of Cryptology: A Professional Reference and Interactive TutorialFundamentals of Cryptology: A Professional Reference and Interactive Tutorial
by - Springer
This is a thoroughly written wonderful book on cryptography! This excellent book is warmly recommended for mathematicians, computer scientists, for professors and students, and, as a reference book, for researchers in the area of cryptography.
(10710 views)
Book cover: Introduction to Modern CryptographyIntroduction to Modern Cryptography
by - University of California at Davis
The viewpoint taken throughout these notes is to emphasize the theory of cryptography as it can be applied to practice. This is an approach that the authors have pursued in the research, and it seems to be a pedagogically desirable approach as well.
(11849 views)
Book cover: Cracking Codes with PythonCracking Codes with Python
by - inventwithpython.com
The book teaches complete beginners how to program in the Python programming language. It features the source code to several ciphers and hacking programs for these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.
(6267 views)