Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Posting-Version: version B 2.10.1 6/24/83; site cadvax
Path: utzoo!linus!vaxine!wjh12!genrad!decvax!decwrl!amd70!cae780!ubvax!megatest!cadvax!mab
From: mab@cadvax (Matt Bishop)
Newsgroups: net.lang.c
Subject: Re: Cbenson's data encryption technique (plea for help)
Message-ID: <106@cadvax>
Date: Tue, 12-Jun-84 09:31:44 EDT
Article-I.D.: cadvax.106
Posted: Tue Jun 12 09:31:44 1984
Date-Received: Wed, 20-Jun-84 01:15:32 EDT
References: <528@reed.UUCP>, <2347@brl-vgr.ARPA>, <3921@utzoo.UUCP>
Organization: Megatest Corp., San Jose, CA
Lines: 16


   You can also look in Dorothy Denning's book, "Cryptography and
Data Security", in the first chapter on cryptography (I think it's
chapter 2, but I'm at home and my copy is at work, so I can't check
that for you.) Also, I don't remember where, but I'm sure Konheim talks
about it in his book "Cryptography".

   Unless you're REALLY mathematically inclined, try Dorothy's book first!

-- 
					Peace,

					Matt Bishop

UUCP:	decvax!decwrl!sun!megatest!mab
ARPA:	megatest!mab@lbl-csam