000 01371 a2200217 4500
003 Nust
005 20170207154036.0
010 _a 2002034167
020 _a0763722073
040 _cNust
082 0 0 _a005.8
100 1 _aBishop, David,
245 1 0 _aIntroduction to cryptography with Java applets -(E-BOOK)
_cDavid Bishop.
260 _aBoston :
_bJones and Bartlett,
_c2003.
300 _axvi, 370 p. :
_bill. ;
_c24 cm.
505 _aChapter 1: A History of Cryptography (Page-1), Chapter 2: Large Integer Computing (Page-33), Chapter 3: The Integers (Page-65), Chapter 4: Linear Diophantine Equations and Linear Congruences (Page-89), Chapter 5: Linear Ciphers (Page-105), Chapter 6: Systems of Linear Congruences—Single Modulus (Page-125), Chapter 7: Matrix Ciphers (Page-143), Chapter 8: Systems of Linear Congruences—Multiple Moduli (Page-161), Chapter 9: Quadratic Congruences (Page-169), Chapter 10: Quadratic Ciphers (Page-181), Chapter 11: Primality Testing (Page-213), Chapter 12: Factorization Techniques (Page-221), Chapter 13: Exponential Congruences (Page-235), Chapter 14: Exponential Ciphers (Page-259), Chapter 15: Establishing Keys and Message Exchange(Page- 279), Chapter 16: Cryptographic Applications (Page-299).v
650 0 _aComputer security.
650 0 _aCryptography.
650 0 _aJava (Computer program language)
651 _aE-BOOK
942 _2ddc
_cBK
999 _c192387
_d192387