| 000 | 01371 a2200217 4500 | ||
|---|---|---|---|
| 003 | Nust | ||
| 005 | 20170207154036.0 | ||
| 010 | _a 2002034167 | ||
| 020 | _a0763722073 | ||
| 040 | _cNust | ||
| 082 | 0 | 0 | _a005.8 |
| 100 | 1 | _aBishop, David, | |
| 245 | 1 | 0 |
_aIntroduction to cryptography with Java applets -(E-BOOK) _cDavid Bishop. |
| 260 |
_aBoston : _bJones and Bartlett, _c2003. |
||
| 300 |
_axvi, 370 p. : _bill. ; _c24 cm. |
||
| 505 | _aChapter 1: A History of Cryptography (Page-1), Chapter 2: Large Integer Computing (Page-33), Chapter 3: The Integers (Page-65), Chapter 4: Linear Diophantine Equations and Linear Congruences (Page-89), Chapter 5: Linear Ciphers (Page-105), Chapter 6: Systems of Linear Congruences—Single Modulus (Page-125), Chapter 7: Matrix Ciphers (Page-143), Chapter 8: Systems of Linear Congruences—Multiple Moduli (Page-161), Chapter 9: Quadratic Congruences (Page-169), Chapter 10: Quadratic Ciphers (Page-181), Chapter 11: Primality Testing (Page-213), Chapter 12: Factorization Techniques (Page-221), Chapter 13: Exponential Congruences (Page-235), Chapter 14: Exponential Ciphers (Page-259), Chapter 15: Establishing Keys and Message Exchange(Page- 279), Chapter 16: Cryptographic Applications (Page-299).v | ||
| 650 | 0 | _aComputer security. | |
| 650 | 0 | _aCryptography. | |
| 650 | 0 | _aJava (Computer program language) | |
| 651 | _aE-BOOK | ||
| 942 |
_2ddc _cBK |
||
| 999 |
_c192387 _d192387 |
||