- Main
- Computers - Cryptography
- Cryptography: Theory and Practice

Cryptography: Theory and Practice
Douglas R. Stinson, Maura B. Paterson
5.0 /
5.0
0 comments
Paperback
How much do you like this book?
What’s the quality of the file?
Download the book for quality assessment
What’s the quality of the downloaded files?
Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject’s fundamentals while presenting the most current advances in cryptography.
The authors offer comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating around the world.
Key Features of the Fourth Edition:
• New chapter on the exciting, emerging new area of post-quantum cryptography (Chapter 9).
• New high-level, nontechnical overview of the goals and tools of cryptography (Chapter 1).
• New mathematical appendix that summarizes definitions and main results on number theory and algebra (Appendix A).
• An expanded treatment of stream ciphers, including common design techniques along with coverage of Trivium.
• Interesting attacks on cryptosystems, including: padding oracle attack, correlation attacks and algebraic attacks on stream ciphers, attack on the DUAL-EC random bit generator that makes use of a trapdoor.
• A treatment of the sponge construction for hash functions and its use in the new SHA-3 hash standard.
• Methods of key distribution in sensor networks.
• The basics of visual cryptography, allowing a secure method to split a secret visual message into pieces (shares) that can later be combined to reconstruct the secret.
• The fundamental techniques cryptocurrencies, as used in Bitcoin and blockchain.
• The basics of the new methods employed in messaging protocols such as Signal, including deniability and Diffie-Hellman key ratcheting.
The authors offer comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating around the world.
Key Features of the Fourth Edition:
• New chapter on the exciting, emerging new area of post-quantum cryptography (Chapter 9).
• New high-level, nontechnical overview of the goals and tools of cryptography (Chapter 1).
• New mathematical appendix that summarizes definitions and main results on number theory and algebra (Appendix A).
• An expanded treatment of stream ciphers, including common design techniques along with coverage of Trivium.
• Interesting attacks on cryptosystems, including: padding oracle attack, correlation attacks and algebraic attacks on stream ciphers, attack on the DUAL-EC random bit generator that makes use of a trapdoor.
• A treatment of the sponge construction for hash functions and its use in the new SHA-3 hash standard.
• Methods of key distribution in sensor networks.
• The basics of visual cryptography, allowing a secure method to split a secret visual message into pieces (shares) that can later be combined to reconstruct the secret.
• The fundamental techniques cryptocurrencies, as used in Bitcoin and blockchain.
• The basics of the new methods employed in messaging protocols such as Signal, including deniability and Diffie-Hellman key ratcheting.
Categories:
Content Type:
BooksYear:
2018
Edition:
4
Publisher:
CRC Press
Language:
english
Pages:
598
ISBN 10:
1138197017
ISBN 13:
9781138197015
Series:
Textbooks in Mathematics
File:
PDF, 22.74 MB
Your tags:
IPFS:
CID , CID Blake2b
english, 2018
Add to My Library
- Favorites
pdf, 22.74 MB
-
Download
-
Convert to
- Unlock conversion of files larger than 8 MBPremium
The file will be sent to your email address. It may take up to 1-5 minutes before you receive it.
The file will be sent to you via the Telegram messenger. It may take up to 1-5 minutes before you receive it.
Note: Make sure you have linked your account to Z-Library Telegram bot.
The file will be sent to your Kindle account. It may take up to 1–5 minutes before you receive it.
Please note: you need to verify every book you want to send to your Kindle. Check your mailbox for the verification email from Amazon Kindle.
Conversion to is in progress
Conversion to is failed
Premium benefits
- Send to eReaders
- Increased download limit
File converter
More search results
More benefits
Most frequently terms
Related Booklists















































































































































































































































