Logo

Coding Theory and Cryptography

Large book cover: Coding Theory and Cryptography

Coding Theory and Cryptography
by

Publisher: Springer
ISBN/ASIN: 3540663363
ISBN-13: 9783540663362
Number of pages: 256

Description:
This book concerns elementary and advanced aspects of coding theory and cryptography. The coding theory contributions deal mostly with algebraic coding theory. Some of these papers are expository, whereas others are the result of original research. There are both, historical and mathematical papers on cryptography. Several of the contributions on cryptography describe the work done by the British and their allies during World War II to crack the German and Japanese ciphers.

Download or read it online for free here:
Download link
(multiple formats)

Similar books

Book cover: A Graduate Course in Applied CryptographyA Graduate Course in Applied Cryptography
by - cryptobook.us
This book is about constructing practical cryptosystems for which we can argue security under plausible assumptions. The book covers many constructions for different tasks in cryptography. For each task we define a precise security goal ...
(688 views)
Book cover: Basic CryptanalysisBasic Cryptanalysis
- United States Department of the Army
Introduction to cryptanalysis, monographic, polygraphic, and polyalphabetic substitution systems, transposition systems, analysis of code systems. Text also contains exhaustive material to aid in the solution of cipher systems.
(9331 views)
Book cover: An introduction to CryptographyAn introduction to Cryptography
by
This guide describes how to use PGP to manage your organization’s messages and data. It is an overview of the terminology and concepts of PGP products. It contains discussions of security, privacy, and the vulnerabilities inherent in PGP.
(11578 views)
Book cover: Public-Key Cryptography: Theory and PracticePublic-Key Cryptography: Theory and Practice
by - TU Darmstadt
Multiple aspects of public-key cryptography are examined. The author covers the theory of provably secure public-key cryptography and the implementation of exponentiation and multi-exponentiation. An introduction to provable security is provided.
(7841 views)