Cryptography: Theory and Practice, Third Edition

CRC Press, Nov 1, 2005 - Computers - 616 pages
THE LEGACY...
First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography.

WHY A THIRD EDITION?

The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering:
• Pseudorandom bit generation in cryptography
• Entity authentication, including schemes built from primitives and special purpose "zero-knowledge" schemes
• Key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs
• Public key infrastructure, including identity-based cryptography
• Secret sharing schemes

THE RESULT...

Providing mathematical background in a "just-in-time" fashion, informal descriptions of cryptosystems along with more precise pseudocode, and a host of numerical examples and exercises, Cryptography: Theory and Practice, Third Edition offers comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the mind-boggling amount of information circulating around the world.
• What people are saying -Write a review

User ratings

5 stars
 2
4 stars
 1
3 stars
 1
2 stars
 0
1 star
 1

User Review - Flag as inappropriate

This is the hardest test book I have ever read on earth as an engineering student. The book is progressed with mathematical proof without suitable explanation and introduction. The exercise problems are especially merciless. The lack of sample problems even increases the pain. However, for anyone who want to build a solid mathematical understanding of cryptography. Go for this, and don't forget to refer to some other more intuitive material on the subject if need help.

User Review - Flag as inappropriate

This book is pathetic. For all the knowledge it may contain it is useless at delivering it to anyone who doesn't already understand the material. This piece of garbage is nothing more than a reference source for someone who already has a solid understanding of Cryptography and Number Theory concepts.

Contents

 I 1 II 3 III 7 IV 8 V 12 VI 13 VII 19 VIII 21
 CII 274 CIII 281 CIV 284 CV 286 CVI 287 CVII 289 CVIII 292 CIX 293

 IX 26 X 27 XI 29 XII 32 XIII 36 XIV 37 XV 39 XVII 45 XVIII 46 XIX 48 XX 54 XXI 56 XXII 59 XXIII 62 XXIV 67 XXV 70 XXVI 73 XXVII 74 XXVIII 79 XXIX 80 XXX 82 XXXI 84 XXXII 89 XXXIII 95 XXXV 100 XXXVI 102 XXXVII 103 XXXVIII 108 XXXIX 109 XL 113 XLI 119 XLII 121 XLIII 122 XLIV 123 XLV 127 XLVI 129 XLVII 131 XLVIII 137 XLIX 140 L 141 LI 144 LII 145 LIII 148 LIV 151 LV 153 LVI 161 LVII 163 LIX 167 LX 170 LXI 173 LXII 174 LXIII 178 LXIV 179 LXV 182 LXVI 186 LXVII 187 LXVIII 189 LXX 191 LXXI 194 LXXII 199 LXXIII 201 LXXV 202 LXXVI 207 LXXVII 211 LXXVIII 213 LXXIX 215 LXXXI 218 LXXXII 225 LXXXIII 233 LXXXIV 236 LXXXVI 238 LXXXVII 241 LXXXVIII 244 LXXXIX 246 XC 250 XCI 254 XCII 255 XCIII 257 XCIV 261 XCV 262 XCVI 265 XCVII 267 XCVIII 268 C 272 CI 273
 CX 294 CXI 297 CXII 299 CXIV 304 CXV 307 CXVI 313 CXVII 317 CXVIII 323 CXIX 327 CXX 330 CXXI 336 CXXII 339 CXXIII 344 CXXIV 349 CXXV 353 CXXVI 356 CXXVII 361 CXXVIII 363 CXXIX 367 CXXXI 368 CXXXII 371 CXXXIII 374 CXXXIV 378 CXXXV 383 CXXXVI 386 CXXXVII 387 CXXXVIII 393 CXXXIX 397 CXL 399 CXLII 406 CXLIII 409 CXLIV 410 CXLV 414 CXLVI 415 CXLVII 416 CXLVIII 417 CXLIX 421 CL 424 CLI 429 CLII 431 CLIII 432 CLIV 436 CLV 438 CLVI 441 CLVII 444 CLVIII 448 CLIX 450 CLX 453 CLXI 457 CLXII 459 CLXIII 461 CLXIV 463 CLXV 464 CLXVII 466 CLXVIII 467 CLXIX 468 CLXX 471 CLXXII 472 CLXXIII 473 CLXXIV 479 CLXXV 481 CLXXVI 485 CLXXVII 486 CLXXVIII 488 CLXXIX 493 CLXXX 496 CLXXXI 498 CLXXXII 505 CLXXXIII 509 CLXXXIV 513 CLXXXV 517 CLXXXVI 518 CLXXXVII 528 CLXXXVIII 531 CLXXXIX 533 CXC 534 CXCI 537 CXCII 539 CXCIII 540 CXCIV 542 CXCV 548 CXCVI 552 CXCVII 557 CXCVIII 561 Copyright

Popular passages

Page 575 - Matsui, Linear Cryptanalysis Method for DES Cipher, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT'93, pp.