Modern Cryptology: A Tutorial
β Scribed by Gilles Brassard (auth.)
- Publisher
- Springer-Verlag New York
- Year
- 1988
- Tongue
- English
- Leaves
- 113
- Series
- Lecture Notes in Computer Science 325
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Cryptology is the art and science of secure communication over insecure channels. The primary aim of this book is to provide a self-contained overview of recent cryptologic achievements and techniques in a form that can be understood by readers having no previous acquaintance with cryptology. It can thus be used as independent reading by whoever wishes to get started on the subject. An extensive bibliography of 250 references is included to help the reader deepen his or her understanding and go beyond the topics treated here. This book can also be used as preliminary material for an introductory course on cryptology. Despite its simplicity, it covers enough state-of-the-art material to be nevertheless of interest to the specialist. After a survey of the main secret and public key techniques, various applications are discussed. The last chapter describes 'quantum cryptography', a revolutionary approach to cryptography that remains secure even against an opponent with unlimited computing power. Quantum crytography is based on the principles of quantum physics.
β¦ Table of Contents
Introduction....Pages 1-3
Definitions and classification....Pages 4-7
Secret-key systems....Pages 8-19
Public-key systems....Pages 20-39
Applications....Pages 40-78
Quantum cryptography....Pages 79-90
β¦ Subjects
Data Encryption
π SIMILAR VOLUMES
<p>The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable for these threats. Also, new issues have co
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenère, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Na