Introduction to Modern Cryptography

Introduction to Modern Cryptography

Introduction to Modern Cryptography

Introduction to Modern Cryptography

eBook

$105.49  $140.00 Save 25% Current price is $105.49, Original price is $140. You Save 25%.

Available on Compatible NOOK Devices and the free NOOK Apps.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal definitions, rigorous proofs of security.


Product Details

ISBN-13: 9781351133012
Publisher: CRC Press
Publication date: 12/20/2020
Series: Chapman & Hall/CRC Cryptography and Network Security Series
Sold by: Barnes & Noble
Format: eBook
Pages: 648
File size: 31 MB
Note: This product may take a few minutes to download.

About the Author

Jonathan Katz is Director, Maryland Cybersecurity Center and Professor, Department of Computer Science and UMIACS Department of Electrical and Computer Engineering at University of Maryland. He is the co-author with Yehuda Lindell of Introdution to Modern Cryptography, Second Edition, published by CRC Press.Vadim

Yehuda Lindell is a professor in the Department of Computer Science at Bar-Ilan University where he conducts research on cryptography with a focus on the theory of secure computation and its application in practice. Lindell received a Raviv Fellowship[1] and spent two years at IBM's cryptography research group at the T.J. Watson Research Center.

Table of Contents

1. Introduction. 2. Perfectly Secret Encryption. 3. Private-Key Encryption. 4. Message Authentication Codes. 5. CCA-Security and Authenticated Encryption. 6. Hash Functions and Applications. 7. Practical Constructions of Symmetric-Key Primitives. 8. *Theoretical Constructions of Symmetric-Key Primitives. 9. Number Theory and Cryptographic Hardness Assumptions. 10. *Algorithms for Factoring and Computing Discrete Logarithms. 11. Key Management and the Public-Key Revolution. 12. Public-Key Encryption. 13. Digital Signature Schemes. 14. *Post-Quantum Cryptography. 15. *Advanced Topics in Public-Key Encryption.
From the B&N Reads Blog

Customer Reviews