Introduction to Cryptography / Edition 2

Introduction to Cryptography / Edition 2

ISBN-10:
0387207562
ISBN-13:
9780387207568
Pub. Date:
07/13/2004
Publisher:
Springer New York
ISBN-10:
0387207562
ISBN-13:
9780387207568
Pub. Date:
07/13/2004
Publisher:
Springer New York
Introduction to Cryptography / Edition 2

Introduction to Cryptography / Edition 2

$79.99
Current price is , Original price is $79.99. You
$79.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

$29.02 
  • SHIP THIS ITEM

    Temporarily Out of Stock Online

    Please check back later for updated availability.

    • Condition: Good
    Note: Access code and/or supplemental material are not guaranteed to be included with used textbook.

Overview

This book explains the basic methods of modern cryptography. It is written for readers with only basic mathematical knowledge who are interested in modern cryptographic algorithms and their mathematical foundation. Several exercises are included following each chapter.

From the reviews: "Gives a clear and systematic introduction into the subject whose popularity is ever increasing, and can be recommended to all who would like to learn about cryptography." —ZENTRALBLATT MATH


Product Details

ISBN-13: 9780387207568
Publisher: Springer New York
Publication date: 07/13/2004
Series: Undergraduate Texts in Mathematics
Edition description: 2nd ed. 2004
Pages: 338
Product dimensions: 6.10(w) x 9.25(h) x 0.03(d)

About the Author

Johannes A. Buchmann is Professor of Computer Science and Mathematics at the Technical University of Darmstadt, and an Associate Editor of the Journal of Cryptology. In 1985, he received a Feodor Lynen Fellowship of the Alexander von Humboldt Foundation. He has also received the most prestigious award in science in Germany, the Leibniz Award of the German Science Foundation (Deutsche Forschungsgemeinschaft).

Table of Contents

1 Integers.- 2 Congruences and Residue Class Rings.- 3 Encryption.- 4 Probability and Perfect Secrecy.- 5 DES.- 6 AES.- 7 Prime Number Generation.- 8 Public-Key Encryption.- 9 Factoring.- 10 Discrete Logarithms.- 11 Cryptographic Hash Functions.- 12 Digital Signatures.- 13 Other Systems.- 14 Identification.- 15 Secret Sharing.- 16 Public-Key Infrastructures.- Solutions of the exercises.- References.
From the B&N Reads Blog

Customer Reviews