Skip to main content

Tutorial: Cryptography and data security

  • Chapter 5 Cryptography
  • Conference paper
  • First Online:
Machines, Languages, and Complexity (IMYCS 1988)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 381))

Included in the following conference series:

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Some useful books

  • D.E. Denning. Cryptography and Data Security. Reading, Mass.: Addison-Wesley (1982). Concentrates on various aspects of data security.

    Google Scholar 

  • H.F. Gaines. Cryptanalysis. New York: Dover Publications (1939). A classic on cryptanalysis.

    Google Scholar 

  • D. Kahn. The Codebreakers: The Story of Secret Writing. New York: Macmillan (1967). The Bible of classical cryptography.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

J. Dassow J. Kelemen

Rights and permissions

Reprints and permissions

Copyright information

© 1989 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Salomaa, A. (1989). Tutorial: Cryptography and data security. In: Dassow, J., Kelemen, J. (eds) Machines, Languages, and Complexity. IMYCS 1988. Lecture Notes in Computer Science, vol 381. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0015941

Download citation

  • DOI: https://doi.org/10.1007/BFb0015941

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-51516-6

  • Online ISBN: 978-3-540-48203-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics