**Coding Theory and Cryptography**

by David Joyner

**Publisher**: Springer 2000**ISBN/ASIN**: 3540663363**ISBN-13**: 9783540663362**Number of pages**: 256

**Description**:

This book concerns elementary and advanced aspects of coding theory and cryptography. The coding theory contributions deal mostly with algebraic coding theory. Some of these papers are expository, whereas others are the result of original research. There are both, historical and mathematical papers on cryptography. Several of the contributions on cryptography describe the work done by the British and their allies during World War II to crack the German and Japanese ciphers.

Download or read it online for free here:

**Download link**

(multiple formats)

## Similar books

**Public-Key Cryptography: Theory and Practice**

by

**Bodo Moeller**-

**TU Darmstadt**

Multiple aspects of public-key cryptography are examined. The author covers the theory of provably secure public-key cryptography and the implementation of exponentiation and multi-exponentiation. An introduction to provable security is provided.

(

**7667**views)

**A brief introduction of quantum cryptography for engineers**

by

**Bing Qi, Li Qian, Hoi-Kwong Lo**-

**arXiv**

We present the principles behind quantum key distribution and discuss a few well-known QKD protocols. We focus more on the implementation of QKD protocols rather than security analysis. Another topic covered here is the security of QKD systems.

(

**8869**views)

**Introduction to Modern Cryptography**

by

**Mihir Bellare, Phillip Rogaway**

The viewpoint taken throughout these notes is to emphasize the theory of cryptography as it can be applied to practice. This is an approach that the authors have pursued in the research, and it seems to be a pedagogically desirable approach as well.

(

**10258**views)

**Visual Cryptography and Its Applications**

by

**Jonathan Weir, WeiQi Yan**-

**BookBoon**

Visual cryptography provides a technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed, the original secret can be discovered without computer participation.

(

**5440**views)