Cryptography; Stinson Douglas R.; 2005

Cryptography Upplaga 3

av Stinson Douglas R.
THE LEGACY…
First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography.

WHY A THIRD EDITION?

The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering:
Pseudorandom bit generation in cryptography
Entity authentication, including schemes built from primitives and special purpose "zero-knowledge" schemes
Key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs
Public key infrastructure, including identity-based cryptography
Secret sharing schemes
Multicast security, including broadcast encryption and copyright protection

THE RESULT…

Providing mathematical background in a "just-in-time" fashion, informal descriptions of cryptosystems along with more precise pseudocode, and a host of numerical examples and exercises, Cryptography: Theory and Practice, Third Edition offers comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the mind-boggling amount of information circulating around the world.
THE LEGACY…
First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography.

WHY A THIRD EDITION?

The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering:
Pseudorandom bit generation in cryptography
Entity authentication, including schemes built from primitives and special purpose "zero-knowledge" schemes
Key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs
Public key infrastructure, including identity-based cryptography
Secret sharing schemes
Multicast security, including broadcast encryption and copyright protection

THE RESULT…

Providing mathematical background in a "just-in-time" fashion, informal descriptions of cryptosystems along with more precise pseudocode, and a host of numerical examples and exercises, Cryptography: Theory and Practice, Third Edition offers comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the mind-boggling amount of information circulating around the world.
Upplaga: 3e upplagan
Utgiven: 2005
ISBN: 9781584885085
Förlag: Chapman & Hall/CRC
Format: Inbunden
Språk: Engelska
Sidor: 616 st
THE LEGACY…
First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography.

WHY A THIRD EDITION?

The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering:
Pseudorandom bit generation in cryptography
Entity authentication, including schemes built from primitives and special purpose "zero-knowledge" schemes
Key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs
Public key infrastructure, including identity-based cryptography
Secret sharing schemes
Multicast security, including broadcast encryption and copyright protection

THE RESULT…

Providing mathematical background in a "just-in-time" fashion, informal descriptions of cryptosystems along with more precise pseudocode, and a host of numerical examples and exercises, Cryptography: Theory and Practice, Third Edition offers comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the mind-boggling amount of information circulating around the world.
THE LEGACY…
First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography.

WHY A THIRD EDITION?

The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering:
Pseudorandom bit generation in cryptography
Entity authentication, including schemes built from primitives and special purpose "zero-knowledge" schemes
Key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs
Public key infrastructure, including identity-based cryptography
Secret sharing schemes
Multicast security, including broadcast encryption and copyright protection

THE RESULT…

Providing mathematical background in a "just-in-time" fashion, informal descriptions of cryptosystems along with more precise pseudocode, and a host of numerical examples and exercises, Cryptography: Theory and Practice, Third Edition offers comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the mind-boggling amount of information circulating around the world.
Begagnad bok (0 st)
Begagnad bok (0 st)