A Classical Introduction to Cryptography: Applications for Communications Security

Author:   Serge Vaudenay
Publisher:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of hardcover 1st ed. 2006
ISBN:  

9781441937971


Pages:   336
Publication Date:   29 October 2010
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $211.07 Quantity:  
Add to Cart

Share |

A Classical Introduction to Cryptography: Applications for Communications Security


Add your own review!

Overview

A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes. This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra and number theory for cryptologists; public key cryptography and cryptanalysis of these schemes; and other cryptographic protocols, e.g. secret sharing, zero-knowledge proofs and undeniable signature schemes. A Classical Introduction to Cryptography: Applications for Communications Security is designed for upper-level undergraduate and graduate-level students in computer science. This book is also suitable for researchers and practitioners in industry. A separate exercise/solution booklet is available as well, please go to www.springeronline.com under author: Vaudenay for additional details on how to purchase this booklet.

Full Product Details

Author:   Serge Vaudenay
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of hardcover 1st ed. 2006
Dimensions:   Width: 15.50cm , Height: 1.80cm , Length: 23.50cm
Weight:   0.545kg
ISBN:  

9781441937971


ISBN 10:   1441937978
Pages:   336
Publication Date:   29 October 2010
Audience:   Professional and scholarly ,  College/higher education ,  Professional and scholarly ,  Professional & Vocational ,  Undergraduate
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Prehistory of Cryptography.- Conventional Cryptography.- Dedicated Conventional Cryptographic Primitives.- ?Conventional Security Analysis.- Security Protocols with Conventional Cryptography.- Algorithmic Algebra.- Algorithmic Number Theory.- ?Elements of Complexity Theory.- Public-Key Cryptography.- Digital Signature.- ?Cryptographic Protocols.- From Cryptography to Communication Security.

Reviews

From the reviews: This impressive hardback introduces fundamentals of information and communications security by providing mathematical concepts to prove or break the security of cryptographic schemes. ! The book is designed for upper-level undergraduates and graduate level students in computer science. This comprehensive volume is also suitable for researchers and practitioners in industry. (Cryptologia, Vol. 30, 2006) This book presents, using a chronological order, both conventional cryptography and public-key cryptography, as well as the two sides of cryptanalysis: adversary modelling and proof reduction. ! This advanced-level textbook is recommended for those interested in cryptography and its applications: students, researchers, computer scientists, mathematicians, engineers, and practitioners in industry. (Michael M. Dediu, Mathematical Reviews, Issue 2007 b)


From the reviews: This impressive hardback introduces fundamentals of information and communications security by providing mathematical concepts to prove or break the security of cryptographic schemes. ... The book is designed for upper-level undergraduates and graduate level students in computer science. This comprehensive volume is also suitable for researchers and practitioners in industry. (Cryptologia, Vol. 30, 2006) This book presents, using a chronological order, both conventional cryptography and public-key cryptography, as well as the two sides of cryptanalysis: adversary modelling and proof reduction. ... This advanced-level textbook is recommended for those interested in cryptography and its applications: students, researchers, computer scientists, mathematicians, engineers, and practitioners in industry. (Michael M. Dediu, Mathematical Reviews, Issue 2007 b)


From the reviews: This impressive hardback introduces fundamentals of information and communications security by providing mathematical concepts to prove or break the security of cryptographic schemes. ... The book is designed for upper-level undergraduates and graduate level students in computer science. This comprehensive volume is also suitable for researchers and practitioners in industry. (Cryptologia, Vol. 30, 2006) This book presents, using a chronological order, both conventional cryptography and public-key cryptography, as well as the two sides of cryptanalysis: adversary modelling and proof reduction. ... This advanced-level textbook is recommended for those interested in cryptography and its applications: students, researchers, computer scientists, mathematicians, engineers, and practitioners in industry. (Michael M. Dediu, Mathematical Reviews, Issue 2007 b)


Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

lgn

al

Shopping Cart
Your cart is empty
Shopping cart
Mailing List