Mathematical Methods of Information Security. Textbook for Universities
Please sign in so that we can notify you about a reply
The training manual outlines some approaches and methods of modern cryptography. The theoretical and malformations are considered in cryptography, the algebraic basis of cryptography, mathematical models of ciphers, perfect ciphers, made by them of them, symmetrical block ciphers, ciphers with open keys, cryptographic hash-function, authentication methods, secretary separation, authentication protocols, protocols of authentication. , protocols with zero disclosure of knowledge, key transmission protocols, cryptosystems based on the final fields and elliptical curves.
The book is focused on teachers, graduate students, and information security students studying the disciplines "Cryptographic methods of information protection", "cryptographic protocols", "methods of algebraic geometry in cryptography", "theoretical and product methods in cryptography"
The book is focused on teachers, graduate students, and information security students studying the disciplines "Cryptographic methods of information protection", "cryptographic protocols", "methods of algebraic geometry in cryptography", "theoretical and product methods in cryptography"
Author:
Author:Рацеев С.
Cover:
Cover:Hard
Category:
- Category:Computer & Technology
Publication language:
Publication Language:Russian
Paper:
Paper:Offset
Age restrictions:
Age restrictions:12+
ISBN:
ISBN:978-5-8114-8589-5
No reviews found