Presented to you through Paradigm Publishing Services
Princeton University Press
Chapter
Licensed
Unlicensed
Requires Authentication
LIST OF SYMBOLS
You are currently not able to access this content.
You are currently not able to access this content.
Chapters in this book
- Frontmatter i
- CONTENTS vii
- PREFACE xi
- ACKNOWLEDGMENTS xiii
- 1. Introduction to Ciphers and Substitution 1
- 2. Polyalphabetic Substitution Ciphers 29
- 3. Transposition Ciphers 75
- 4. Ciphers and Computers 109
- 5. Stream Ciphers 145
- 6. Ciphers Involving Exponentiation 182
- 7. Public-Key Ciphers 201
- 8. Other Public-Key Systems 241
- 9. The Future of Cryptography 276
- LIST OF SYMBOLS 303
- NOTES 305
- SUGGESTIONS FOR FURTHER READING 345
- BIBLIOGRAPHY 349
- INDEX 367
Chapters in this book
- Frontmatter i
- CONTENTS vii
- PREFACE xi
- ACKNOWLEDGMENTS xiii
- 1. Introduction to Ciphers and Substitution 1
- 2. Polyalphabetic Substitution Ciphers 29
- 3. Transposition Ciphers 75
- 4. Ciphers and Computers 109
- 5. Stream Ciphers 145
- 6. Ciphers Involving Exponentiation 182
- 7. Public-Key Ciphers 201
- 8. Other Public-Key Systems 241
- 9. The Future of Cryptography 276
- LIST OF SYMBOLS 303
- NOTES 305
- SUGGESTIONS FOR FURTHER READING 345
- BIBLIOGRAPHY 349
- INDEX 367