Cryptography Theory And Practice

Free Download

Authors:

Edition: 1

Series: Discrete Mathematics and Its Applications

ISBN: 9780849385216, 0849385210

Size: 17 MB (17635745 bytes)

Pages: 573/573

File format:

Language:

Publishing Year:

Category: Tags: , ,

Douglas Stinson9780849385216, 0849385210

Cryptography is an outstanding book that covers all the major areas of cryptography in a readable, mathematically precise form. Several chapters deal with especially active areas of research and give the reader a quick introduction and overview of the basic results in the area. Cryptography provides the mathematical theory that is necessary in order to understand how the various systems work. Most algorithms are presented in the form of pseudocode, together with examples and informal discussion of the underlying ideas. The book gives careful and comprehensive treatment of all the essential core areas of cryptography. Also, several chapters present recent topics that have not received thorough treatment in previous textbooks. Such topics include authentication codes, secret sharing schemes, identification schemes, and key distribution.

Table of contents :
Local Disk……Page 0
Cryptography: Theory and Practice:Table of Contents……Page 1
Cryptography: Theory and Practice:Preface……Page 6
Cryptography: Theory and Practice:Dedication……Page 10
Cryptography: Theory and Practice:Classical Cryptography……Page 11
Cryptography: Theory and Practice:Classical Cryptography……Page 14
Cryptography: Theory and Practice:Classical Cryptography……Page 17
Cryptography: Theory and Practice:Classical Cryptography……Page 21
Cryptography: Theory and Practice:Classical Cryptography……Page 26
Cryptography: Theory and Practice:Classical Cryptography……Page 31
Cryptography: Theory and Practice:Classical Cryptography……Page 36
Cryptography: Theory and Practice:Classical Cryptography……Page 40
Cryptography: Theory and Practice:Classical Cryptography……Page 44
Cryptography: Theory and Practice:Classical Cryptography……Page 47
Cryptography: Theory and Practice:Classical Cryptography……Page 50
Cryptography: Theory and Practice:Classical Cryptography……Page 53
Cryptography: Theory and Practice:Classical Cryptography……Page 58
Cryptography: Theory and Practice:Classical Cryptography……Page 63
Cryptography: Theory and Practice:Shannon’s Theory……Page 70
Cryptography: Theory and Practice:Shannon’s Theory……Page 75
Cryptography: Theory and Practice:Shannon’s Theory……Page 80
Cryptography: Theory and Practice:Shannon’s Theory……Page 83
Cryptography: Theory and Practice:Shannon’s Theory……Page 87
Cryptography: Theory and Practice:Shannon’s Theory……Page 92
Cryptography: Theory and Practice:Shannon’s Theory……Page 95
Cryptography: Theory and Practice:Shannon’s Theory……Page 99
Cryptography: Theory and Practice:Shannon’s Theory……Page 103
Cryptography: Theory and Practice:The Data Encryption Standard……Page 106
Cryptography: Theory and Practice:The Data Encryption Standard……Page 109
Cryptography: Theory and Practice:The Data Encryption Standard……Page 111
Cryptography: Theory and Practice:The Data Encryption Standard……Page 114
Cryptography: Theory and Practice:The Data Encryption Standard……Page 119
Cryptography: Theory and Practice:The Data Encryption Standard……Page 125
Cryptography: Theory and Practice:The Data Encryption Standard……Page 128
Cryptography: Theory and Practice:The Data Encryption Standard……Page 131
Cryptography: Theory and Practice:The Data Encryption Standard……Page 138
Cryptography: Theory and Practice:The Data Encryption Standard……Page 142
Cryptography: Theory and Practice:The Data Encryption Standard……Page 146
Cryptography: Theory and Practice:The Data Encryption Standard……Page 149
Cryptography: Theory and Practice:The Data Encryption Standard……Page 153
Cryptography: Theory and Practice:The Data Encryption Standard……Page 161
Cryptography: Theory and Practice:The RSA System and Factoring……Page 165
Cryptography: Theory and Practice:The RSA System and Factoring……Page 168
Cryptography: Theory and Practice:The RSA System and Factoring……Page 172
Cryptography: Theory and Practice:The RSA System and Factoring……Page 176
Cryptography: Theory and Practice:The RSA System and Factoring……Page 181
Cryptography: Theory and Practice:The RSA System and Factoring……Page 184
Cryptography: Theory and Practice:The RSA System and Factoring……Page 187
Cryptography: Theory and Practice:The RSA System and Factoring……Page 190
Cryptography: Theory and Practice:The RSA System and Factoring……Page 196
Cryptography: Theory and Practice:The RSA System and Factoring……Page 200
Cryptography: Theory and Practice:The RSA System and Factoring……Page 203
Cryptography: Theory and Practice:The RSA System and Factoring……Page 208
Cryptography: Theory and Practice:The RSA System and Factoring……Page 211
Cryptography: Theory and Practice:The RSA System and Factoring……Page 214
Cryptography: Theory and Practice:The RSA System and Factoring……Page 218
Cryptography: Theory and Practice:The RSA System and Factoring……Page 222
Cryptography: Theory and Practice:Other Public-key Cryptosystems……Page 230
Cryptography: Theory and Practice:Other Public-key Cryptosystems……Page 234
Cryptography: Theory and Practice:Other Public-key Cryptosystems……Page 241
Cryptography: Theory and Practice:Other Public-key Cryptosystems……Page 247
Cryptography: Theory and Practice:Other Public-key Cryptosystems……Page 251
Cryptography: Theory and Practice:Other Public-key Cryptosystems……Page 256
Cryptography: Theory and Practice:Other Public-key Cryptosystems……Page 260
Cryptography: Theory and Practice:Other Public-key Cryptosystems……Page 265
Cryptography: Theory and Practice:Other Public-key Cryptosystems……Page 270
Cryptography: Theory and Practice:Other Public-key Cryptosystems……Page 273
Cryptography: Theory and Practice:Signature Schemes……Page 280
Cryptography: Theory and Practice:Signature Schemes……Page 283
Cryptography: Theory and Practice:Signature Schemes……Page 288
Cryptography: Theory and Practice:Signature Schemes……Page 293
Cryptography: Theory and Practice:Signature Schemes……Page 297
Cryptography: Theory and Practice:Signature Schemes……Page 302
Cryptography: Theory and Practice:Signature Schemes……Page 309
Cryptography: Theory and Practice:Signature Schemes……Page 314
Cryptography: Theory and Practice:Hash Functions……Page 317
Cryptography: Theory and Practice:Hash Functions……Page 320
Cryptography: Theory and Practice:Hash Functions……Page 324
Cryptography: Theory and Practice:Hash Functions……Page 331
Cryptography: Theory and Practice:Hash Functions……Page 337
Cryptography: Theory and Practice:Hash Functions……Page 341
Cryptography: Theory and Practice:Hash Functions……Page 345
Cryptography: Theory and Practice:Key Distribution and Key Agreement……Page 349
Cryptography: Theory and Practice:Key Distribution and Key Agreement……Page 352
Cryptography: Theory and Practice:Key Distribution and Key Agreement……Page 357
Cryptography: Theory and Practice:Key Distribution and Key Agreement……Page 362
Cryptography: Theory and Practice:Key Distribution and Key Agreement……Page 365
Cryptography: Theory and Practice:Key Distribution and Key Agreement……Page 371
Cryptography: Theory and Practice:Key Distribution and Key Agreement……Page 376
Cryptography: Theory and Practice:Identification Schemes……Page 379
Cryptography: Theory and Practice:Identification Schemes……Page 383
Cryptography: Theory and Practice:Identification Schemes……Page 388
Cryptography: Theory and Practice:Identification Schemes……Page 392
Cryptography: Theory and Practice:Identification Schemes……Page 396
Cryptography: Theory and Practice:Identification Schemes……Page 402
Cryptography: Theory and Practice:Authentication Codes……Page 405
Cryptography: Theory and Practice:Authentication Codes……Page 408
Cryptography: Theory and Practice:Authentication Codes……Page 413
Cryptography: Theory and Practice:Authentication Codes……Page 421
Cryptography: Theory and Practice:Authentication Codes……Page 424
Cryptography: Theory and Practice:Authentication Codes……Page 430
Cryptography: Theory and Practice:Authentication Codes……Page 434
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 437
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 441
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 445
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 448
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 451
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 454
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 458
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 463
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 466
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 473
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 477
Cryptography: Theory and Practice:Secret Sharing Schemes……Page 481
Cryptography: Theory and Practice:Pseudo-random Number Generation……Page 483
Cryptography: Theory and Practice:Pseudo-random Number Generation……Page 487
Cryptography: Theory and Practice:Pseudo-random Number Generation……Page 491
Cryptography: Theory and Practice:Pseudo-random Number Generation……Page 495
Cryptography: Theory and Practice:Pseudo-random Number Generation……Page 500
Cryptography: Theory and Practice:Pseudo-random Number Generation……Page 504
Cryptography: Theory and Practice:Pseudo-random Number Generation……Page 508
Cryptography: Theory and Practice:Pseudo-random Number Generation……Page 513
Cryptography: Theory and Practice:Zero-knowledge Proofs……Page 515
Cryptography: Theory and Practice:Zero-knowledge Proofs……Page 518
Cryptography: Theory and Practice:Zero-knowledge Proofs……Page 521
Cryptography: Theory and Practice:Zero-knowledge Proofs……Page 524
Cryptography: Theory and Practice:Zero-knowledge Proofs……Page 527
Cryptography: Theory and Practice:Zero-knowledge Proofs……Page 530
Cryptography: Theory and Practice:Zero-knowledge Proofs……Page 533
Cryptography: Theory and Practice:Zero-knowledge Proofs……Page 538
Cryptography: Theory and Practice:Zero-knowledge Proofs……Page 541
Cryptography: Theory and Practice:Further Reading……Page 543
Cryptography: Theory and Practice:Index……Page 559

Reviews

There are no reviews yet.

Be the first to review “Cryptography Theory And Practice”
Shopping Cart
Scroll to Top