Normal view MARC view ISBD view

Contemporary cryptology : the science of information integrity / edited by Gustavus J. Simmons.

Contributor(s): Simmons, Gustavus J | John Wiley & Sons [publisher.] | Institute of Electrical and Electronics Engineers | IEEE Xplore (Online service) [distributor.].
Material type: materialTypeLabelBookPublisher: Piscataway, New Jersey : IEEE Press, c1992Distributor: [Piscataqay, New Jersey] : IEEE Xplore, [1999]Description: 1 PDF (xv, 640 pages) : illustrations.Content type: text Media type: electronic Carrier type: online resourceISBN: 9780470544327.Subject(s): Computer security | Telecommunication systems -- Security measures | Cryptography | Aircraft | Algorithm design and analysis | Authentication | Biographies | Chapters | Complexity theory | Computational complexity | Computers | Cryptography | Digital signatures | Elliptic curve cryptography | Encryption | Forgery | Games | Generators | Gold | Indexes | Instruments | Interpolation | Laboratories | Law | Linear systems | Local area networks | Monitoring | NIST | Nonvolatile memory | Nuclear weapons | Parity check codes | Pins | Polynomials | Probabilistic logic | Proposals | Protocols | Public key | Public key cryptography | Radar | Receivers | Registers | Sections | Security | Sensors | Signal processing algorithms | Smart cards | Transmitters | Very large scale integrationGenre/Form: Electronic books.Additional physical formats: Print version:: No titleDDC classification: 005.8/2 Online resources: Abstract with links to resource Also available in print.
Contents:
The data encryption standard : past and future / Miles E. Smid, Dennis K. Branstad -- Stream ciphers / Rainer A. Rueppel -- The first ten years of public key cryptology / Whitfield Diffie -- Public key cryptography / James Nechvatal -- A comparison of practical public key cryptosystems based on integer factorization and discrete logarithms /
How to insure that data acquired to verify treaty compliance are trustworth / G.J. Simmons.
Summary: The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers.
    average rating: 0.0 (0 votes)
No physical items for this record

"The Institute of Electrical and Electronics Engineers, Inc., New York."

"IEEE order number: PC0271-7"--T.p. verso.

Includes bibliographical references and index.

The data encryption standard : past and future / Miles E. Smid, Dennis K. Branstad -- Stream ciphers / Rainer A. Rueppel -- The first ten years of public key cryptology / Whitfield Diffie -- Public key cryptography / James Nechvatal -- A comparison of practical public key cryptosystems based on integer factorization and discrete logarithms /

How to insure that data acquired to verify treaty compliance are trustworth / G.J. Simmons.

Restricted to subscribers or individual electronic text purchasers.

The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers.

Also available in print.

Mode of access: World Wide Web

Description based on PDF viewed 12/21/2015.

There are no comments for this item.

Log in to your account to post a comment.