Download App
>> | LShop | >> | Book | >> | Mathematics & Scienc... | >> | Mathematics | >> | Cryptography : Theor... |
ISBN
:
9781584882060
Publisher
:
Chapman & Hall / CRC
Subject
:
Mathematics, Computer Programming / Software Development, Operating Systems
Binding
:
HARDCOVER
Pages
:
360
Year
:
2002
₹
595.0
₹
464.0
Buy Now
Shipping charges are applicable for books below Rs. 101.0
View Details(Imported Edition) Estimated Shipping Time : 20-23 Business Days
View DetailsDescription
The Advanced Encryption Standard (AES), elliptic curve DSA, the secure hash algorithmx2026;these and other major advances made in recent years precipitated this comprehensive revision of the standard-setting text and reference, Cryptography: Theory and Practice. Now more tightly focused on the core areas, it contains many additional topics as well as thoroughly updated treatments of topics presented in the first edition. There is increased emphasis on general concepts, but the outstanding features that first made this a bestseller all remain, including its mathematical rigor, numerous examples, pseudocode descriptions of algorithms, and clear, precise explanations.Highlights of the Second Edition:Explains the latest Federal Information Processing Standards, including the Advanced Encryption Standard (AES), the Secure Hash Algorithm (SHA-1), and the Elliptic Curve Digital Signature Algorithm (ECDSA)Uses substitution-permutation networks to introduce block cipher design and analysis conceptsExplains both linear and differential cryptanalysisPresents the Random Oracle model for hash functionsAddresses semantic security of RSA and Optional Asymmetric Encryption PaddingDiscusses Wiener's attack on low decryption exponent RSA Overwhelmingly popular and relied upon in its first edition, now, more than ever, Cryptography: Theory and Practice provides an introduction to the field ideal for upper-level students in both mathematics and computer science.More highlights of the Second Edition:Provably secure signature schemes: Full Domain HashUniversal hash familiesExpanded treatment of message authentication codesMore discussions on elliptic curvesLower bounds for the complexity of generic algorithms for the discrete logarithm problemExpanded treatment of factoring algorithmsSecurity definitions for signature schemes
Related Items
-
of