
Essay database with free papers will provide you with original and creative ideas.
Complexity Theory - Cryptograp
Complexity Theory - Cryptography by: Chuck Introduction One important, yet practical, application of complexity theory is cryptography. It has become one of the main tools for privacy, trust, electronic payments, and other forms of security. It is no longer just a military tool and the advantages it provides should be used to the fullest extent. This paper will discuss basic terminology and popular methods of cryptography. Terminology Cryptography is the science of scrambling text so
Rabin, M.O. Probalistic algorithms. In Algorithms and Complexity: New Directions and Recent Results, J.F. Traub, Ed. Academic Press, 1976, 21-39. 5. Rivest, M.O., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21, 2 (1978), 120-126. 6. Spiser, M. Introduction to the Theory of Computation. PWS Publishing, 1997. 7. Stinson, D.R. Cryptography: Theory and Practice. CRC Press, 1995. 8. Turing, A. M. On computable numbers. In Proceedings, London Mathematical Society, (1936), 230-265.
