1993-07-16 - Re: Crypto Credentials

Header Data

From: uri@watson.ibm.com
To: cypherpunks@toad.com (cypherpunks)
Message Hash: 3c207ea09a03ad8e479aa593ec37892fdcaba7ac7c9b7a3092bcee92060c979d
Message ID: <9307160226.AA18903@buoy.watson.ibm.com>
Reply To: <9307152150.AA24691@photon.magnus.acs.ohio-state.edu>
UTC Datetime: 1993-07-16 02:26:23 UTC
Raw Date: Thu, 15 Jul 93 19:26:23 PDT

Raw message

From: uri@watson.ibm.com
Date: Thu, 15 Jul 93 19:26:23 PDT
To: cypherpunks@toad.com (cypherpunks)
Subject: Re: Crypto Credentials
In-Reply-To: <9307152150.AA24691@photon.magnus.acs.ohio-state.edu>
Message-ID: <9307160226.AA18903@buoy.watson.ibm.com>
MIME-Version: 1.0
Content-Type: text/plain


Andrew S Hall says:
> .................From
> there, the sci.crypt FAQ, and then, if you are serious, Denning's
> _Cryptography and Data Security_.

Oh, come on. With all due respect (:-) I have to disagree. Why on Earth
have you to select this book?! Maybe you don't like
	A. Konheim "Cryptography: A Primer"

Or maybe you don't feel, that
	Meyer & Matyas "Cryptography. A New Dimension in Data Security"

covers enough of the field, at least for a beginner?

Or maybe there are no new goodies like
	G. Simmons "Contemporary Cryptology"

with lots and lots of annotated bibliography?

> A deep and complex topic like cryptography
> requires as deep and complex study as the scholar wish to apply. That can
> mean a lifetime.

Indeed. One more reason to start with a real stuff (:-).

[Oh, of course, all the proper apologies for exhaling the
smoke and fire, and for misquoting (slightly, I hope) the
exact names of the books. :-]
--
Regards,
Uri         uri@watson.ibm.com      scifi!angmar!uri 	N2RIU
-----------
<Disclamer>


From cypherpunks-request  Thu Jul 15 23:20:05 1993




Thread