| Titre : | Cryptography : theory and practice | | Type de document : | texte imprimé | | Auteurs : | Douglas R. Stinson, Auteur | | Mention d'édition : | 3rd. ed. | | Editeur : | Boca Raton, London, New York : Chapman & hALL/CRC | | Année de publication : | 2006 | | Collection : | Discrete Mathematics and ITS Applications | | Importance : | 593 p. | | Présentation : | couv. ill. en coul., ill. | | Format : | 24 cm. | | ISBN/ISSN/EAN : | 978-1-584-88508-5 | | Langues : | Anglais (eng) | | Catégories : | TELECOMMUNICATION
| | Index. décimale : | 28-04 Traitement du signal appliqué aux télécommunications | | Résumé : | First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography.
WHY A THIRD EDITION?
The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering:
Pseudorandom bit generation in cryptography
Entity authentication, including schemes built from primitives and special purpose "zero-knowledge" schemes
Key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs
Public key infrastructure, including identity-based cryptography
Secret sharing schemes
Multicast security, including broadcast encryption and copyright protection | | Note de contenu : | Table of contents
1 CLASSICAL CRYPTOGRAPHY
2 SHANNON'S THEORY
3 BLOCK CIPHERS AND THE ADVANCED ENCRYPTION STANDARD
4 CRYPTOGRAPHIC HASH FUNCTIONS
5 THE RSA CRYPTOSYSTEM AND FACTORING INTEGERS
6 PUBLIC-KEY CRYPTOGRAPHY AND DISCRETE LOGARITHMS
7 SIGNATURE SCHEMES
8 PSEUDO-RANDOM NUMBER GENERATION
9 IDENTIFICATION SCHEMES AND ENTITY AUTHENTICATION
10 KEY DISTRIBUTION
11 KEY AGREEMENT SCHEMES
12 PUBLIC-KEY INFRASTRUCTURE
13 SECRET SHARING SCHEMES
14 MULTICAST SECURITY AND COPYRIGHT PROTECTION
-INDEX
|
Cryptography : theory and practice [texte imprimé] / Douglas R. Stinson, Auteur . - 3rd. ed. . - Boca Raton, London, New York : Chapman & hALL/CRC, 2006 . - 593 p. : couv. ill. en coul., ill. ; 24 cm.. - ( Discrete Mathematics and ITS Applications) . ISBN : 978-1-584-88508-5 Langues : Anglais ( eng) | Catégories : | TELECOMMUNICATION
| | Index. décimale : | 28-04 Traitement du signal appliqué aux télécommunications | | Résumé : | First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography.
WHY A THIRD EDITION?
The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering:
Pseudorandom bit generation in cryptography
Entity authentication, including schemes built from primitives and special purpose "zero-knowledge" schemes
Key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs
Public key infrastructure, including identity-based cryptography
Secret sharing schemes
Multicast security, including broadcast encryption and copyright protection | | Note de contenu : | Table of contents
1 CLASSICAL CRYPTOGRAPHY
2 SHANNON'S THEORY
3 BLOCK CIPHERS AND THE ADVANCED ENCRYPTION STANDARD
4 CRYPTOGRAPHIC HASH FUNCTIONS
5 THE RSA CRYPTOSYSTEM AND FACTORING INTEGERS
6 PUBLIC-KEY CRYPTOGRAPHY AND DISCRETE LOGARITHMS
7 SIGNATURE SCHEMES
8 PSEUDO-RANDOM NUMBER GENERATION
9 IDENTIFICATION SCHEMES AND ENTITY AUTHENTICATION
10 KEY DISTRIBUTION
11 KEY AGREEMENT SCHEMES
12 PUBLIC-KEY INFRASTRUCTURE
13 SECRET SHARING SCHEMES
14 MULTICAST SECURITY AND COPYRIGHT PROTECTION
-INDEX
|
|  |