![]() The chapter names below are links to the corresponding applet pages.īelow are links to download individual programs for an assortment of algorithms and computer exercises from the book. Below is a brief list of the programs that are included for the corresponding chapters. Some of the exercises of Chapter 5 should only be done with the applets from that chapter (or using the MATLAB/Octave/FreeMat programs that appear further down this page readers with stronger computer backgrounds may instead write their own programs using the computer implementation suggestions that appear at the end of each chapter). They should be helpful for readers by allowing them to do deeper investigations and examples without the distraction of lengthy hand computations. CiphertextsĪ very nice set of platform-independent applets has been created by Eric Flior for some of the core programs of Chapters 1-6. From this file, readers can copy and paste ciphertext passages directly into the platform-independent applets (below) or into any other cryptographic programs. The link below brings you to a text file (created with Notepad) that contains the strings of ciphertexts that appear in Exercises and Exercises for the Reader in the first five chapters. It contains some sample course outlines and information on how to obtain some useful instructor supplements. The link below takes you to an instructor's resource page for the book. To see the book's errata page click on this link: Errata.To see the book's preface click on this link: Preface.To see a more detailed version of the contents click on this link: Detailed TOC. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |