HSPLS site
HSPLS site
 Search 
 My Account 
 Databases 
 HI Newspaper 
 eBooks/Audiobooks 
 Learning 
 PC Reservation 
 Reading Program 
   
BasicAdvancedPowerHistory
Search:    Refine Search  
> You're searching: HAWAII STATE PUBLIC LIBRARY SYSTEM
 
Item Information
 HoldingsHoldings
  Summary
  More Content
 
 
 More by this author
 
  •  
  • Holden, Joshua, 1970- author.
     
     Subjects
     
  •  
  • Cryptography -- Mathematics.
     
  •  
  • Ciphers.
     
  •  
  • Computer security.
     
     Browse Catalog
      by author:
     
  •  
  •  Holden, Joshua, 1970- author.
     
      by title:
     
  •  
  •  The mathematics of s...
     
     
     
     MARC Display
    The mathematics of secrets : cryptography from Caesar ciphers to digital encryption / Joshua Holden.
    by Holden, Joshua, 1970- author.
    View full image
    Princeton : Princeton University Press, c2017.
    Subjects
  • Cryptography -- Mathematics.
  •  
  • Ciphers.
  •  
  • Computer security.
  • ISBN: 
    9780691141756 (hardcover : alk. paper) :
    0691141754 (hardcover : alk. paper)
    Description: 
    xiv, 373 pages : illustrations, charts ; 25 cm
    Requests: 
    0
    Summary: 
    "The Mathematics of Secrets takes readers on a tour of the mathematics behind cryptography--the science of sending secret messages. Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers operate, as he focuses on both code making and code breaking. He discusses the majority of ancient and modern ciphers currently known, beginning by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. He explores polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, ciphers involving exponentiation, and public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. Only basic mathematics up to high school algebra is needed to understand and enjoy the book." -- adapted from jacket flap.
    Add to my list 
    Copy/Holding information
    LocationCollectionCall No.CopyStatusDue Date 
    Aina Haina Public LibraryAdult Nonfiction005.82 Ho Checked out06/04/2024Add Copy to MyList
    Hawaii State LibraryBusiness, Science & Technology005.82 Ho Checked In Add Copy to MyList
    Hilo Public LibraryAdult Nonfiction005.82 Holden Checked In Add Copy to MyList
    Kailua Public LibraryAdult Nonfiction005.82 Ho Checked In Add Copy to MyList
    Kaimuki Public LibraryAdult Nonfiction005.82 Ho[computer shelf]Checked In Add Copy to MyList
    Wahiawa Public LibraryAdult Nonfiction005.82 Ho Checked In Add Copy to MyList


    Horizon Information Portal 3.25_9884
     Powered by Dynix
    © 2001-2013 SirsiDynix All rights reserved.
    Horizon Information Portal