Loading...
Please wait, while we are loading the content...
Similar Documents
Cryptographic Applications
| Content Provider | Scilit |
|---|---|
| Author | Kraft, James S. Washington, Lawrence C. |
| Copyright Year | 2016 |
| Description | Bob wants to send a message to Alice so that Alice, and only Alice, can read it. For example, Alice may own a business and Bob may need to send her his credit card number so that he may make a purchase. This message is usually called the plaintext. To keep the message secret, he encrypts it to a secret, unreadable form called the ciphertext, which he sends to Alice. Alice then decrypts to obtain the original plaintext. Book Name: An Introduction to Number Theory with Cryptography |
| Related Links | https://content.taylorfrancis.com/books/download?dac=C2013-0-19084-X&isbn=9780429156588&doi=10.1201/b15718-9&format=pdf |
| Ending Page | 210 |
| Page Count | 26 |
| Starting Page | 185 |
| DOI | 10.1201/b15718-9 |
| Language | English |
| Publisher | Informa UK Limited |
| Publisher Date | 2016-04-19 |
| Access Restriction | Open |
| Subject Keyword | Book Name: An Introduction To Number Theory with Cryptography Card Number Bob Wants Message Secret Unreadable Form |
| Content Type | Text |
| Resource Type | Chapter |