An introduction to cryptography
β Scribed by Richard A. Mollin
- Book ID
- 127446656
- Publisher
- Chapman & Hall/CRC
- Year
- 2007
- Tongue
- English
- Weight
- 3 MB
- Series
- Discrete mathematics and its applications
- Edition
- 2nd ed
- Category
- Library
- City
- Boca Raton
- ISBN-13
- 9781584886181
No coin nor oath required. For personal study only.
β¦ Synopsis
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition features all of the requisite background material on number theory and algorithmic complexity, includes a historical look at the field, and offers updated and expanded exercise sets. In addition to updates throughout the text, this edition includes two new chapters on current and future applications that cover topics such as electronic mail, Internet security, protocol layers and SSL, firewalls, client-server model and cookies, network security, wireless security, smart cards, and biometrics. The book also provides additional information on cryptanalysis and primality testing as well as appendices on DES and primitive roots.
π SIMILAR VOLUMES
This introduction to cryptography employs a programming-oriented approach to study the most important cryptographic schemes in current use and the main cryptanalytic attacks against them. Discussion of the theoretical aspects, emphasizing precise security definitions based on methodological tools su
An Introduction to Mathematical Cryptography provides an introduction to public key cryptography and underlying mathematics that is required for the subject. Each of the eight chapters expands on a specific area of mathematical cryptography and provides an extensive list of exercises. It is a suita
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.In the first part, this book covers
Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, etc. Therefore, users should not only know how its techniques work, but they must also be able to estimate their efficiency and security. Based on courses taught at T