×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Introduction to Cryptography with Coding Theory / Edition 1
     

Introduction to Cryptography with Coding Theory / Edition 1

by Wade Trappe, Lawrence C. Washington
 

ISBN-10: 0130618144

ISBN-13: 9780130618146

Pub. Date: 01/15/2002

Publisher: Prentice Hall

This book assumes a minimal background in programming and a level of math sophistication equivalent to a course in linear algebra. It provides a flexible organization, as each chapter is modular and can be covered in any order. Using Mathematica, Maple, and MATLAB, computer examples included in an Appendix explain how to do computation and demonstrate important

Overview

This book assumes a minimal background in programming and a level of math sophistication equivalent to a course in linear algebra. It provides a flexible organization, as each chapter is modular and can be covered in any order. Using Mathematica, Maple, and MATLAB, computer examples included in an Appendix explain how to do computation and demonstrate important concepts. A full chapter on error correcting codes introduces the basic elements of coding theory. Other topics covered: Classical cryptosystems, basic number theory, the data encryption standard, AES: Rijndael, the RSA algorithm, discrete logarithms, digital signatures, e-commerce and digital cash, secret sharing schemes, games, zero knowledge techniques, key establishment protocols, information theory, elliptic curves, error correcting codes, quantum cryptography. For professionals in cryptography and network security.

Product Details

ISBN-13:
9780130618146
Publisher:
Prentice Hall
Publication date:
01/15/2002
Edition description:
Older Edition
Pages:
504
Product dimensions:
7.25(w) x 9.50(h) x 0.75(d)

Table of Contents

Preface.
1. Overview.
2. Classical Cryptosystems.
3. Basic Number Theory.
4. The Data Encryption Standard.
5. AES: Rijndael.
6. The RSA Algorithm.
7. Discrete Logarithms.
8. Digital Signatures.
9. E-Commerce and Digital Cash.
10. Secret Sharing Schemes.
11. Games.
12. Zero Knowledge Techniques.
13. Key Establishment Protocols.
14. Information Theory.
15. Elliptic Curves.
16. Error Correcting Codes.
17. Quantum Cryptography.
Appendix A: Mathematica.
Appendix B: Maple.
Appendix C: Matlab.
Appendix D: Further Reading.
Bibliography.
Index.

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews