The textbook introduces various areas of cryptography to undergraduate and graduate students in mathematics and computer science. It covers classical cryptosystems, Shannon's approach to perfect secrecy, block ciphers and hash functions. Public-key cryptography, signature schemes and pseudo random n
Cryptography: Theory and Practice
β Scribed by Douglas R. Stinson, Maura B. Paterson
- Publisher
- CRC Press
- Year
- 2018
- Tongue
- English
- Leaves
- 599
- Series
- Textbooks in Mathematics
- Edition
- 4
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subjectβs fundamentals while presenting the most current advances in cryptography.
The authors offer comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating around the world.
Key Features of the Fourth Edition:
β’ New chapter on the exciting, emerging new area of post-quantum cryptography (Chapter 9).
β’ New high-level, nontechnical overview of the goals and tools of cryptography (Chapter 1).
β’ New mathematical appendix that summarizes definitions and main results on number theory and algebra (Appendix A).
β’ An expanded treatment of stream ciphers, including common design techniques along with coverage of Trivium.
β’ Interesting attacks on cryptosystems, including: padding oracle attack, correlation attacks and algebraic attacks on stream ciphers, attack on the DUAL-EC random bit generator that makes use of a trapdoor.
β’ A treatment of the sponge construction for hash functions and its use in the new SHA-3 hash standard.
β’ Methods of key distribution in sensor networks.
β’ The basics of visual cryptography, allowing a secure method to split a secret visual message into pieces (shares) that can later be combined to reconstruct the secret.
β’ The fundamental techniques cryptocurrencies, as used in Bitcoin and blockchain.
β’ The basics of the new methods employed in messaging protocols such as Signal, including deniability and Diffie-Hellman key ratcheting.
β¦ Subjects
Cryptography; Block Ciphers; Stream Ciphers; Hash Functions; Message Authentification; RSA Cryptosystem; Public-Key Cryptography; Post-Quantum Cryptography; Signature Schemes; Identification Schemes; Key Distribution; Key Agreement Schemes
π SIMILAR VOLUMES
Cryptography is an outstanding book that covers all the major areas of cryptography in a readable, mathematically precise form. Several chapters deal with especially active areas of research and give the reader a quick introduction and overview of the basic results in the area. Cryptography prov
THE LEGACY⦠First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third ed
<p>Through three editions, <b><i>Cryptography: Theory and Practice</i></b>, has been embraced by instructors and students alike. It offers a comprehensive primer for the subjectβs fundamentals while presenting the most current advances in cryptography.</p> <p>The authors offer comprehensive, in-dept