A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes.
This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra and number theory for cryptologists; public key cryptography and cryptanalysis of these schemes; and other cryptographic protocols, e.g. secret sharing, zero-knowledge proofs and undeniable signature schemes.
A Classical Introduction to Cryptography: Applications for Communications Security is designed for upper-level undergraduate and graduate-level students in computer science. This book is also suitable for researchers and practitioners in industry. A separate exercise/solution booklet is available as well, please go to www.springeronline.com under author: Vaudenay for additional details on how to purchase this booklet.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
From the reviews:
"This impressive hardback introduces fundamentals of information and communications security by providing mathematical concepts to prove or break the security of cryptographic schemes. ... The book is designed for upper-level undergraduates and graduate level students in computer science. This comprehensive volume is also suitable for researchers and practitioners in industry." (Cryptologia, Vol. 30, 2006)
"This book presents, using a chronological order, both conventional cryptography and public-key cryptography, as well as the two sides of cryptanalysis: adversary modelling and proof reduction. ... This advanced-level textbook is recommended for those interested in cryptography and its applications: students, researchers, computer scientists, mathematicians, engineers, and practitioners in industry." (Michael M. Dediu, Mathematical Reviews, Issue 2007 b)
Preamble 1: Prehistory of Cryptography 1.1 Foundations of Conventional Cryptography 1.2 Roots of Modern Cryptography 1.3 The Shannon Theory of Secrecy 1.4 Exercises 2: Conventional Cryptography 2.1 The Data Encryption Standard (DES) 2.2 DES Modes of Operation 2.3 Multiple Encryption 2.4 An Application of DES: UNIX Passwords 2.5 Classical Cipher Skeletons 2.6 Other Block Cipher Examples 2.7 The Advanced Encryption Standard (AES) 2.8 Stream Ciphers 2.9 Brute Force Attacks 2.10 Exercises 3: Dedicated Conventional Cryptographic Primitives 3.1 Cryptographic Hashing 3.2 The Birthday Paradox 3.3 A Dedicated Attack on MD4 3.4 Message Authentication Codes 3.5 Cryptographic Pseudorandom Generators 3.6 Exercises 4: Conventional Security Analysis 4.1 Differential Cryptanalysis 4.2 Linear Cryptanalysis 4.3 Classical Security Strengthening 4.4 Modern Security Analysis 4.5 Exercises 5: Security Protocols with Conventional Cryptography 5.1 Password Access Control 5.2 Challenge-Response Protocols 5.3 One-Time Password 5.4 Key Distribution 5.5 Authentication Chains 5.6 Wireless Communication: Two Case Studies 5.7 Exercises 6: Algorithmic Algebra 6.1 Basic Group Theory 6.2 The Ring Zn 6.3 The Finite Field Zn 6.4 Finite Fields 6.5 Elliptic Curves over Finite Fields 6.6 Exercises 7: Algorithmic Number Theory 7.1 Primality 7.2 Factorization 7.3 Computing Orders in Groups 7.4 Discrete Logarithm 7.5 Exercises 8: Elements of Complexity Theory 8.1 Formal Computation 8.2 Ability Frontiers 8.3 Complexity Reduction 8.4 Exercises 9: Public-Key Cryptography 9.1 Diffie-Hellman 9.2 Experiment with NP-Completeness 9.3 Rivest-Shamir-Adleman (RSA) 9.4 ElGamal Encryption 9.5 Exercises 10: Digital Signature 10.1 Digital Signature Schemes 10.2 RSA Signature 10.3 ElGamal Signature Family 10.4 Toward Provable Security for Digital Signatures 10.5 Exercises 11: Cryptographic Protocols 11.1 Zero-Knowledge 11.2 Secret Sharing 11 3 Special Purpose Digital Signatures 11.4 Other Protocols 11.5 Exercises 12: From Cryptography to Communication Security 12.1 Certificates 12.2 SSH: Secure Shell 12.3 SSL: Secure Socket Layer 12.4 PGP: Pretty Good Privacy 12.5 Exercises Further Readings Bibliography Index
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
GRATIS per la spedizione in U.S.A.
Destinazione, tempi e costiGRATIS per la spedizione in U.S.A.
Destinazione, tempi e costiDa: Jenson Books Inc, Logan, UT, U.S.A.
hardcover. Condizione: Good. This item shows signs of wear from consistent use, but it remains in good condition and works perfectly. All pages and cover are intact , but may have aesthetic issues such as small tears, bends, scratches, and scuffs. Spine may also show signs of wear. Pages may include some notes and highlighting. May include "From the library of" labels. Satisfaction Guaranteed. Codice articolo 4BQGBJ011W7J_ns
Quantità: 1 disponibili
Da: HPB-Red, Dallas, TX, U.S.A.
hardcover. Condizione: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Codice articolo S_393865034
Quantità: 1 disponibili
Da: One Planet Books, Columbia, MO, U.S.A.
hardcover. Condizione: Good. 2006th Edition. Ships in a BOX from Central Missouri! May not include working access code. Will not include dust jacket. Has used sticker(s) and some writing and/or highlighting. UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes). Codice articolo 000828260U
Quantità: 5 disponibili
Da: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
Condizione: New. Brand New. Soft Cover International Edition. Different ISBN and Cover Image. Priced lower than the standard editions which is usually intended to make them more affordable for students abroad. The core content of the book is generally the same as the standard edition. The country selling restrictions may be printed on the book but is no problem for the self-use. This Item maybe shipped from US or any other country as we have multiple locations worldwide. Codice articolo ABNR-241724
Quantità: 2 disponibili
Da: Textbooks_Source, Columbia, MO, U.S.A.
hardcover. Condizione: Good. 2006th Edition. Ships in a BOX from Central Missouri! May not include working access code. Will not include dust jacket. Has used sticker(s) and some writing or highlighting. UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes). Codice articolo 000828260U
Quantità: 5 disponibili
Da: myVend, Altötting, Germania
Hardcover. Condizione: Used: Like New. Buch stammt aus aufgelà ster Lehrbuchsammlung, Label, Stempel und Notizen mà glich. Codice articolo CW-UCTE-UW6S
Quantità: 4 disponibili
Da: LiLi - La Liberté des Livres, CANEJAN, Francia
Condizione: good. Le livre peut montrer des signes d'usure dus a une utilisation constante, etre marque, porter des marques d'identification ou presenter plusieurs dommages esthetiques mineurs. vendeur professionnel; envoi soigne en 24/48h. Codice articolo 2412180003210
Quantità: 1 disponibili
Da: BennettBooksLtd, North Las Vegas, NV, U.S.A.
hardcover. Condizione: New. In shrink wrap. Looks like an interesting title! Codice articolo Q-0387254641
Quantità: 1 disponibili
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
Condizione: New. Codice articolo ABLIING23Feb2215580171286
Quantità: Più di 20 disponibili
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
Buch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware 360 pp. Englisch. Codice articolo 9780387254647
Quantità: 2 disponibili