Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century / Edition 1

Hardcover (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $110.75
Usually ships in 1-2 business days
(Save 33%)
Other sellers (Hardcover)
  • All (9) from $110.75   
  • New (6) from $141.72   
  • Used (3) from $110.75   

Overview

"Cryptography, Information Theory, and Error-Correction offers a complete, yet accessible account of the technologies shaping the 21st century. This book contains the most up-to-date, detailed, and balanced treatment available on these subjects. The authors draw on their experience both in the classroom and in industry, giving the book's material and presentation a unique real-world orientation." "With its reader-friendly style and interdisciplinary emphasis, Cryptography, Information Theory, and Error-Correction serves as both a teaching text and a tool for self-learning. The chapter structure allows for anyone with a high school mathematics education to gain a strong conceptual understanding, and provides higher-level students with more mathematically advanced topics. The authors clearly map out paths through the book for readers of all levels to maximize their learning." Cryptography, Information Theory, and Error-Correction is an in-depth text for both graduate and undergraduate students of mathematics, computer science, and engineering. It is also an authoritative overview of IT professionals, statisticians, mathematicians, computer scientists, electrical engineers, entrepreneurs and the generally curious.
Read More Show Less

Editorial Reviews

From the Publisher
"…the book is a useful information source for all people interested in information security." (Computing Reviews.com, January 18, 2006)

"The book is certainly to be recommended, and it can be used at various levels, as both a reference text an as a text for undergraduate and graduate courses…" (Mathematical Reviews, 2006b)

"…readers of this book will find their enthusiasm for communication theory greatly stimulated…" (CHOICE, December 2005)

"…although encyclopedic, is lively and engaging, written with palpable enthusiasm…a very readable text, one that encourages a reader to dip in and sample the treats." (MAA Reviews, June 23, 2005)

"...one of the most outstanding works in this area; it will prove useful to a broad category of readers…" (Computing Reviews.com, October 28, 2005)

Read More Show Less

Product Details

Meet the Author

AIDEN A. BRUEN, PHD, is a Professor of Mathematics and Statistics at the University of Calgary in Calgary, Alberta, Canada. He has over 100 published articles in refereed journals and has served for many years on the Editorial Board of Designs, Codes and Cryptography. His research interests include error-correcting codes, number theory, algebraic geometry, algebra finite geometries, information theory, and cryptography.

MARIO A. FORCINITO, PHD, is a professional engineer with over ten years' experience as an industrial consultant. He is President of SUR Consultants in Engineering Science Inc., a member of the IEEE Computer Society, and has published extensively in peer-reviewed journals. Dr. Forcinito has experience lecturing on cryptography and numerical methods at several technical meetings.

Read More Show Less

Table of Contents

1 History and Claude E. Shannon 3
2 Classical ciphers and their cryptanalysis 17
3 RSA, key searches, SSL, and encrypting email 39
4 The fundamentals of modern cryptography 69
5 DES, AES and operating modes 95
6 Elliptic curve cryptography (ECC) 113
7 Attacks in cryptography 131
8 Practical issus 145
9 Information theory and its applications 161
10 Random variables and entropy 175
11 Source coding, data compression, redundancy 203
12 Channels, capacity, the fundamental theorem 225
13 Signals, sampling, SNR, coding gain 253
14 Ergodic and Markov sources, language entropy 261
15 Perfect secrecy : the new paradigm 277
16 Shift registers (LFSR) and stream ciphers 289
17 The genetic code 307
18 Error-correction, haddamard, block designs 319
19 Finite fields, linear algebra, and number theory 335
20 Introduction to linear codes 359
21 Linear cyclic codes, shift registers and CRC 379
22 Reed Solomon, MDS codes, bruen-thas-blokhuis 393
23 MDS codes, secret sharing, invariant theory 411
24 Key reconciliation, new algorithms 423
Shannon's entropy table 447
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)