Wednesday, September 16, 2015

The Laws of Cryptography with Java Code

Table of Contents
  1. Preliminaries.
  2. Coding and Information Theory.
  3. Introduction to Cryptography.
  4. Public Key Cryptography.
  5. Random Number Generation.
  6. The Advanced Encryption Standard (AES).
  7. Hash Functions and Digital Signatures.
  8. Randomization Techniques.
  9. Identification and Key Distribution.
  10. Java Programs.

The Laws of Cryptography with Java Code.




SHARE BY GK
Computer Knowledge

No comments:

Post a Comment