This book covers applied cryptography in computerized telecommunication networks. The authors present key technologies, algorithms, protocols, and methods of design and analysis, rendering algorithms in readable pseudocode and simple graphics and diagrams.
This book covers applied cryptography in computerized telecommunication networks. The authors present key technologies, algorithms, protocols, and methods of design and analysis, rendering algorithms in readable pseudocode and simple graphics and diagrams.