Skip to content
Increase Font Size
Toggle Menu
Home
Read
Sign in
Search in book:
Search
Contents
Front Matter
1.
Introduction to Network Security
2.
Substitution Cipherand Cryptanalysis
3.
Transposition Cipher and Cryptanalysis
4.
Number Theory
5.
Modular Arithmetic
6.
Modular Exponentiation
7.
Algebraic Structures and Finite Fields 1
8.
Algebraic Structures and Finite Fields 2
9.
Prime’s Euler and Fermat’s Theorem
10.
Chinese Remainder Theorem
11.
Exponentiation and Logarithm
12.
Modern Cryptography
13.
Stream Cipher and Block Cipher
14.
RC4
15.
Simplified DES
16.
Data Encryption Standard
17.
Modes of Operation
18.
Advanced Encryption Standard(part1)
19.
Advanced Encryption Standard(part2)
20.
Public Key Cryptography
21.
RSA Cryptosystem
22.
ELGAMMAL Cryptosystem
23.
Elliptic Curve Cryptosystem
24.
Key Management
25.
Diffie-Hellman Key Exchange
26.
Security Models
27.
Hash Algorithm
28.
Hash and MAC Algorithms
29.
Digital Signature
30.
Authentication Application Kerberos
31.
Public Key Infrastructure
32.
Electronic Mail security-PGP
33.
Security Attacks
34.
IP Security
35.
Web Security :SSL and TLS
36.
Firewalls
37.
Need for Security in Networks
38.
Introduction to Wireless LAN Security Standards
39.
WLAN Security
Back Matter
Cryptography and Network
8
Algebraic Structures and Finite Fields 2
Dr Kulothungan
you can view video on Algebraic Structures and Finite Fields 2