Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal definitions, rigorous proofs of security.
Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal definitions, rigorous proofs of security.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
Produktdetails
Chapman & Hall/CRC Cryptography and Network Security Series
Jonathan Katz is Director, Maryland Cybersecurity Center and Professor, Department of Computer Science and UMIACS Department of Electrical and Computer Engineering at University of Maryland. He is the co-author with Yehuda Lindell of Introdution to Modern Cryptography, Second Edition, published by CRC Press.Vadim Yehuda Lindell is a professor in the Department of Computer Science at Bar-Ilan University where he conducts research on cryptography with a focus on the theory of secure computation and its application in practice. Lindell received a Raviv Fellowship[1] and spent two years at IBM's cryptography research group at the T.J. Watson Research Center.
Inhaltsangabe
1. Introduction. 2. Perfectly Secret Encryption. 3. Private Key Encryption. 4. Message Authentication Codes. 5. CCA Security and Authenticated Encryption. 6. Hash Functions and Applications. 7. Practical Constructions of Symmetric Key Primitives. 8. *Theoretical Constructions of Symmetric Key Primitives. 9. Number Theory and Cryptographic Hardness Assumptions. 10. *Algorithms for Factoring and Computing Discrete Logarithms. 11. Key Management and the Public Key Revolution. 12. Public Key Encryption. 13. Digital Signature Schemes. 14. *Post Quantum Cryptography. 15. *Advanced Topics in Public Key Encryption.
1. Introduction. 2. Perfectly Secret Encryption. 3. Private Key Encryption. 4. Message Authentication Codes. 5. CCA Security and Authenticated Encryption. 6. Hash Functions and Applications. 7. Practical Constructions of Symmetric Key Primitives. 8. *Theoretical Constructions of Symmetric Key Primitives. 9. Number Theory and Cryptographic Hardness Assumptions. 10. *Algorithms for Factoring and Computing Discrete Logarithms. 11. Key Management and the Public Key Revolution. 12. Public Key Encryption. 13. Digital Signature Schemes. 14. *Post Quantum Cryptography. 15. *Advanced Topics in Public Key Encryption.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497