Matches in Harvard for { <http://id.lib.harvard.edu/aleph/008602167/catalog> ?p ?o. }
Showing items 1 to 24 of
24
with 100 items per page.
- catalog contributor b12042242.
- catalog contributor b12042243.
- catalog created "c2001.".
- catalog date "2001".
- catalog date "c2001.".
- catalog dateCopyrighted "c2001.".
- catalog description "Includes bibliographical references (p. 337-343) and index.".
- catalog description "pt. I. Secret Key Cryptography. Ch. 1. Locks and Keys. Ch. 2. Substitution and Caesar's Cipher. Ch. 3. Transposition Ciphers: Moving Around. Ch. 4. Diffuse and Confuse: How Cryptographers Win the End Game. Ch. 5. DES Isn't Strong Anymore. Ch. 6. Evolution of Cryptography: Going Global. Ch. 7. Secret Key Assurances. Ch. 8. Problems with Secret Key Exchange -- pt. II. Public Key Cryptography. Ch. 9. Pioneering Public Key: Public Exchange of Secret Keys. Ch. 10. Confidentiality Using Public Keys. Ch. 11. Making Public Keys: Math Tricks. Ch. 12. Creating Digital Signatures Using the Private Key. Ch. 13. Hashes: Non-keyed Message Digests. Ch. 14. Message Digest Assurances. Ch. 15. Comparing Secret Key, Public Key, and Message Digests.".
- catalog extent "xx, 352 p. :".
- catalog hasFormat "Cryptography decrypted.".
- catalog identifier "0201616475".
- catalog isFormatOf "Cryptography decrypted.".
- catalog issued "2001".
- catalog issued "c2001.".
- catalog language "eng".
- catalog publisher "Boston, MA : Addison-Wesley,".
- catalog relation "Cryptography decrypted.".
- catalog subject "005.8/2 21".
- catalog subject "Computer security.".
- catalog subject "Cryptography.".
- catalog subject "QA76.9.A25 M44 2001".
- catalog tableOfContents "pt. I. Secret Key Cryptography. Ch. 1. Locks and Keys. Ch. 2. Substitution and Caesar's Cipher. Ch. 3. Transposition Ciphers: Moving Around. Ch. 4. Diffuse and Confuse: How Cryptographers Win the End Game. Ch. 5. DES Isn't Strong Anymore. Ch. 6. Evolution of Cryptography: Going Global. Ch. 7. Secret Key Assurances. Ch. 8. Problems with Secret Key Exchange -- pt. II. Public Key Cryptography. Ch. 9. Pioneering Public Key: Public Exchange of Secret Keys. Ch. 10. Confidentiality Using Public Keys. Ch. 11. Making Public Keys: Math Tricks. Ch. 12. Creating Digital Signatures Using the Private Key. Ch. 13. Hashes: Non-keyed Message Digests. Ch. 14. Message Digest Assurances. Ch. 15. Comparing Secret Key, Public Key, and Message Digests.".
- catalog title "Cryptography decrypted / H.X. Mel, Doris Baker ; math appendix by Steve Burnett ; foreword by John Kinyon.".
- catalog type "text".