From: uri@watson.ibm.com
To: cypherpunks@toad.com (cypherpunks)
Message Hash: 3c207ea09a03ad8e479aa593ec37892fdcaba7ac7c9b7a3092bcee92060c979d
Message ID: <9307160226.AA18903@buoy.watson.ibm.com>
Reply To: <9307152150.AA24691@photon.magnus.acs.ohio-state.edu>
UTC Datetime: 1993-07-16 02:26:23 UTC
Raw Date: Thu, 15 Jul 93 19:26:23 PDT
From: uri@watson.ibm.com
Date: Thu, 15 Jul 93 19:26:23 PDT
To: cypherpunks@toad.com (cypherpunks)
Subject: Re: Crypto Credentials
In-Reply-To: <9307152150.AA24691@photon.magnus.acs.ohio-state.edu>
Message-ID: <9307160226.AA18903@buoy.watson.ibm.com>
MIME-Version: 1.0
Content-Type: text/plain
Andrew S Hall says:
> .................From
> there, the sci.crypt FAQ, and then, if you are serious, Denning's
> _Cryptography and Data Security_.
Oh, come on. With all due respect (:-) I have to disagree. Why on Earth
have you to select this book?! Maybe you don't like
A. Konheim "Cryptography: A Primer"
Or maybe you don't feel, that
Meyer & Matyas "Cryptography. A New Dimension in Data Security"
covers enough of the field, at least for a beginner?
Or maybe there are no new goodies like
G. Simmons "Contemporary Cryptology"
with lots and lots of annotated bibliography?
> A deep and complex topic like cryptography
> requires as deep and complex study as the scholar wish to apply. That can
> mean a lifetime.
Indeed. One more reason to start with a real stuff (:-).
[Oh, of course, all the proper apologies for exhaling the
smoke and fire, and for misquoting (slightly, I hope) the
exact names of the books. :-]
--
Regards,
Uri uri@watson.ibm.com scifi!angmar!uri N2RIU
-----------
<Disclamer>
From cypherpunks-request Thu Jul 15 23:20:05 1993
Return to July 1993
Return to “uri@watson.ibm.com”