You are here
Everyday Cryptography: Fundamental Principles and Applications
There is no review yet. Please check back later.
Setting the Scene
1. Basic Principles
2. Historical Cryptosystems
3. Theoretical versus Practical Security
The Cryptographic Toolkit
4. Symmetric Encryption
5. Public-Key Encryption
6. Data Integrity
7. Digital Signature Schemes
8. Entity Authentication
9. Cryptographic Protocols
Key Management
10. Key Management
11. Public-Key Management
Use of Cryptography
12. Cryptographic Applications
13. Cryptography for Personal Devices
14. Control of Cryptography
15. Closing Remarks
Dummy View - NOT TO BE DELETED