THE LEGACY…
First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography.
WHY A THIRD EDITION?
The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering:
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
"It is by far the most suitable text for undergraduate and graduate courses on the subject in mathematics and computer science departments. Besides having breadth and scope in the choice of topics, many of them are dealt with in much more depth than what can be found elsewhere at this level . . . If you really want to learn some cryptography this is probably the best available text."
– Peter Shiu, Department of Mathematical Sciences, Loughborough University, in The Mathematical Gazette, March 2007
". . . the book is very well suited for a course in crypotography."
– Bran van Asch, in Mathematical Reviews, 2007f
CLASSICAL CRYPTOGRAPHY
Introduction: Some Simple Cryptosystems
Cryptanalysis
Notes
Exercises
SHANNON'S THEORY
Introduction
Elementary Probability Theory
Perfect Secrecy
Entropy
Properties of Entropy
Spurious Keys and Unicity Distance
Product Cryptosystems
Notes
Exercises
BLOCK CIPHERS AND THE ADVANCED ENCRYPTION STANDARD
Introduction
Substitution-Permutation Networks
Linear Cryptanalysis
Differential Cryptanalysis
The Data Encryption Standard
The Advanced Encryption Standard
Modes of Operation
Notes and References
Exercises
CRYPTOGRAPHIC HASH FUNCTIONS
Hash Functions and Data Integrity
Security of Hash Functions
Iterated Hash Functions
Message Authentication Codes
Unconditionally Secure MACs
Notes and References
Exercises
THE RSA CRYPTOSYSTEM AND FACTORING INTEGERS
Introduction to Public-key Cryptography
More Number Theory
The RSA Cryptosystem
Primality Testing
Square Roots Modulo n
Factoring Algorithms
Other Attacks on RSA
The Rabin Cryptosystem
Semantic Security of RSA
Notes and References
Exercises
PUBLIC-KEY CRYPTOGRAPHY AND DISCRETE LOGARITHMS
The ElGamal Cryptosystem
Algorithms for the Discrete Logarithm Problem
Lower Bounds on the Complexity of Generic Algorithms
Finite Fields
Elliptic Curves
Discrete Logarithm Algorithms in Practice
Security of ElGamal Systems
Notes and References
Exercises
SIGNATURE SCHEMES
Introduction
Security Requirements for Signature Schemes
The ElGamal Signature Scheme
Variants of the ElGamal Signature Scheme
Provably Secure Signature Schemes
Undeniable Signatures
Fail-stop Signatures
Notes and References
Exercises
PSEUDO-RANDOM NUMBER GENERATION
Introduction and Examples
Indistinguishability of Probability Distributions
The Blum-Blum-Shub Generator
Probabilistic Encryption
Notes and References
Exercises
IDENTIFICATION SCHEMES AND ENTITY AUTHENTICATION
Introduction
Challenge-and-Response in the Secret-Key Setting
Challenge-and-Response in the Public-Key Setting
The Schnorr Identification Scheme
The Okamoto Identification Scheme
The Guillou-Quisquater Identification Scheme
Notes and References
Exercises
KEY DISTRIBUTION
Introduction
Diffie-Hellman Key Predistribution
Unconditionally Secure Key Predistribution
Key Distribution Patterns
Session Key Distribution Schemes
Notes and References
Exercises
KEY AGREEMENT SCHEMES
Introduction
Diffie-Hellman Key Agreement
MTI Key Agreement Schemes
Key Agreement Using Self-Certifying Keys
Encrypted Key Exchange
Conference Key Agreement Schemes
Notes and References
Exercises
PUBLIC-KEY INFRASTRUCTURE
Introduction: What is a PKI?
Certificates
Trust Models
The Future of PKI?
Identity-Based Cryptography
Notes and References
Exercises
SECRET SHARING SCHEMES
Introduction: The Shamir Threshold Scheme
Access Structures and General Secret Sharing
Information Rate and Construction of Efficient Schemes
Notes and References
Exercises
MULTICAST SECURITY AND COPYRIGHT PROTECTION
Introduction to Multicast Security
Broadcast Encryption
Multicast Re-Keying
Copyright Protection
Tracing Illegally Redistributed Keys
Notes and References
Exercises
FURTHER READING
BIBLIOGRAPHY
INDEX
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 4,55 per la spedizione da Regno Unito a Italia
Destinazione, tempi e costiEUR 37,81 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiDa: Phatpocket Limited, Waltham Abbey, HERTS, Regno Unito
Condizione: Good. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so some stamps and wear, but in good overall condition. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions. Codice articolo Z1-U-017-02110
Quantità: 1 disponibili
Da: Better World Books Ltd, Dunfermline, Regno Unito
Condizione: Very Good. Ships from the UK. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects. Codice articolo 9561753-6
Quantità: 2 disponibili
Da: Anybook.com, Lincoln, Regno Unito
Condizione: Good. This is an ex-library book and may have the usual library/used-book markings inside.This book has hardback covers. In good all round condition. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,1050grams, ISBN:9781584885085. Codice articolo 5965799
Quantità: 1 disponibili
Da: Anybook.com, Lincoln, Regno Unito
Condizione: Fair. This is an ex-library book and may have the usual library/used-book markings inside.This book has hardback covers. In fair condition, suitable as a study copy. No dust jacket. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,1050grams, ISBN:9781584885085. Codice articolo 4323886
Quantità: 1 disponibili
Da: Buchmarie, Darmstadt, Germania
Condizione: Good. Codice articolo 2977942_3ad_2x
Quantità: 1 disponibili
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Very Good. Used book that is in excellent condition. May show signs of wear or have minor defects. Codice articolo 9079008-6
Quantità: 3 disponibili
Da: SecondSale, Montgomery, IL, U.S.A.
Condizione: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Codice articolo 00064120107
Quantità: 1 disponibili
Da: Anybook.com, Lincoln, Regno Unito
Condizione: Good. This is an ex-library book and may have the usual library/used-book markings inside.This book has hardback covers. In good all round condition. No dust jacket. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,1050grams, ISBN:9781584885085. Codice articolo 9185307
Quantità: 1 disponibili
Da: Zoom Books East, Glendale Heights, IL, U.S.A.
Condizione: very_good. Book is in very good condition and may include minimal underlining highlighting. The book can also include "From the library of" labels. May not contain miscellaneous items toys, dvds, etc. . We offer 100% money back guarantee and 24 7 customer service. Codice articolo ZEV.1584885084.VG
Quantità: 1 disponibili
Da: ZBK Books, Carlstadt, NJ, U.S.A.
Condizione: good. Fast & Free Shipping â" Good condition with a solid cover and clean pages. Shows normal signs of use such as light wear or a few marks highlighting, but overall a well-maintained copy ready to enjoy. Supplemental items like CDs or access codes may not be included. Codice articolo ZWV.1584885084.G
Quantità: 1 disponibili