(SpringerBriefs puter Science) John F. Dooley-A Brief History of Cryptology and Cryptographic Algorithms-Springer International Publishing (2013).pdf


文档分类:管理/人力资源 | 页数:约104页 举报非法文档有奖
1/ 104
下载提示
  • 1.该资料是网友上传的,本站提供全文预览,预览什么样,下载就什么样。
  • 2.下载该文档所得收入归上传者、原创者。
  • 3.下载的文档,不会出现我们的网址水印。
1/ 104
文档列表 文档介绍
SPRINGER BRIEFS PUTER SCIENCE
John F. Dooley
A Brief History of
Cryptology and
Cryptographic
Algorithms
SpringerBriefs puter Science
Series Editors
Stan Zdonik
Peng Ning
Shashi Shekhar
Jonathan Katz
Xindong Wu
Lakhmi C. Jain
David Padua
Xuemin Shen
Borko Furht
V. S. Subrahmanian
Martial Hebert
Katsushi Ikeuchi
Bruno Siciliano
For further volumes:
ies/10028
John F. Dooley
A Brief History
of Cryptology and
Cryptographic Algorithms
1 3
John F. Dooley
Department puter Science
Knox College
Galesburg, IL
USA
ISSN  2191-5768 ISSN  2191-5776 (electronic)
ISBN 978-3-319-01627-6 ISBN 978-3-319-01628-3 (eBook)
DOI -3-319-01628-3
Springer Cham Heidelberg New York Dordrecht London
Library of Congress Control Number: 2013945798
© The Author(s) 2013
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or
information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts
in connection with reviews or scholarly analysis or material supplied specifically for the purpose of
being entered and executed on puter system, for exclusive use by the purchaser of the work.
Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright
Law of the Publisher’s location, in its current version, and permission for use must always be obtained
from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance
Center. Violations are liable to prosecution under the respective Copyright Law.
The use of general descriptive names, registered names, trademarks, service

(SpringerBriefs puter Science) John F. Dooley-A Brief History of Cryptology and Cryptographic Algorithms-Springer International Publishing (2013) 来自淘豆网www.taodocs.com转载请标明出处.

非法内容举报中心
文档信息
  • 页数 104
  • 收藏数 0 收藏
  • 顶次数 0
  • 上传人 bolee65
  • 文件大小 0 KB
  • 时间2014-08-15
最近更新