
1: A History of CryptographyChapter
2: Large Integer ComputingChapter
3: The IntegersChapter
4:Linear Diophantine Equations and Linear CongruencesChapter
5: Linear CiphersChapter
6: Systems of Linear Congruences-Single ModulusChapter
7: Matrix CiphersChapter
8: Systems of Linear Congruences-Multiple ModuliChapter
9: Quadratic CongruencesChapter
10: Quadratic CiphersChapter
11: Primality TestingChapter
12: Factorization TechniquesChapter
13: Exponential CongruencesChapter
14: Exponential CiphersChapter
15: Establishing Keys and Message ExchangeChapter
16: Cryptographic ApplicationsAppendix: List of PropositionsAppendix II: Information Theory
More Information