5 Chapter 6Figure 6.1 The group law.
6 Chapter 7Figure 7.1 Man‐in‐the‐middle attack on symmetric key encryption.Figure 7.2 Man‐in‐the‐middle attack on public key encryption.Figure 7.3 A passive relay attack in which encrypted message
7 Chapter 11Figure 11.1: Decision tree.Figure 11.2: Initial graph.Figure 11.3: After one merge.Figure 11.4: Arithmetic coding.
8 Chapter 13Figure 13.1: The German 10 Deutsche Mark featured Gauss in the 1990s.Figure 13.2: The late Professor J. H. van Lint, one of the world's leading c...
9 Chapter 16Figure 16.1: One clock pulse.Figure 16.2: A general LFSR.Figure 16.3: The 5‐bit LFSR generated by
10 Chapter 17Figure 17.1 Memory hierarchy.Figure 17.2 Memory hierarchy with compressed caching included.Figure 17.3 Compressed caching in main memory.Figure 17.4 Lempel–Ziv tree for the string
11 Chapter 18Figure 18.1 Error correction.
12 Chapter 20Figure 20.1: Fano's geometry with seven lines and seven vertices.
13 Chapter 23Figure 23.1 Bruck net of order 2 and degree 3.Figure 23.2 An MDS code with
14 Chapter 25Figure 25.1
15 Chapter 26Figure 26.1 Blocks linked into a chain.Figure 26.2 Backward hash pointers. See [NBF+16, p. 33].Figure 26.3 The foundation of Bitcoin.
Guide
1 Cover
7 Preface to the Second Edition
8 Acknowledgments for the Second Edition
12 Appendix A
13 Appendix B
14 Glossary
15 Index
16 WILEY END USER LICENSE AGREEMENT
Pages
1 ii
2 iii
3 iv
4 v
5 xvii
6 xviii
7 xix
8 xx
9 xxi
10 xxiii
11 xxv
12 xxvii
13 1
14 3
15 4
16 5
17 6
18