Cryptography: Theory and Practice, Third Edition

Front Cover
CRC Press, Nov 1, 2005 - Computers - 616 pages
5 Reviews
THE LEGACY...
First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography.

WHY A THIRD EDITION?

The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering:
  • Pseudorandom bit generation in cryptography
  • Entity authentication, including schemes built from primitives and special purpose "zero-knowledge" schemes
  • Key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs
  • Public key infrastructure, including identity-based cryptography
  • Secret sharing schemes
  • Multicast security, including broadcast encryption and copyright protection

    THE RESULT...

    Providing mathematical background in a "just-in-time" fashion, informal descriptions of cryptosystems along with more precise pseudocode, and a host of numerical examples and exercises, Cryptography: Theory and Practice, Third Edition offers comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the mind-boggling amount of information circulating around the world.
  •   

    What people are saying - Write a review

    User ratings

    5 stars
    2
    4 stars
    1
    3 stars
    1
    2 stars
    0
    1 star
    1

    User Review - Flag as inappropriate

    This is the hardest test book I have ever read on earth as an engineering student. The book is progressed with mathematical proof without suitable explanation and introduction. The exercise problems are especially merciless. The lack of sample problems even increases the pain. However, for anyone who want to build a solid mathematical understanding of cryptography. Go for this, and don't forget to refer to some other more intuitive material on the subject if need help.  

    User Review - Flag as inappropriate

    This book is pathetic. For all the knowledge it may contain it is useless at delivering it to anyone who doesn't already understand the material. This piece of garbage is nothing more than a reference source for someone who already has a solid understanding of Cryptography and Number Theory concepts. 

    Contents

    I
    1
    II
    3
    III
    7
    IV
    8
    V
    12
    VI
    13
    VII
    19
    VIII
    21
    CII
    274
    CIII
    281
    CIV
    284
    CV
    286
    CVI
    287
    CVII
    289
    CVIII
    292
    CIX
    293

    IX
    26
    X
    27
    XI
    29
    XII
    32
    XIII
    36
    XIV
    37
    XV
    39
    XVII
    45
    XVIII
    46
    XIX
    48
    XX
    54
    XXI
    56
    XXII
    59
    XXIII
    62
    XXIV
    67
    XXV
    70
    XXVI
    73
    XXVII
    74
    XXVIII
    79
    XXIX
    80
    XXX
    82
    XXXI
    84
    XXXII
    89
    XXXIII
    95
    XXXV
    100
    XXXVI
    102
    XXXVII
    103
    XXXVIII
    108
    XXXIX
    109
    XL
    113
    XLI
    119
    XLII
    121
    XLIII
    122
    XLIV
    123
    XLV
    127
    XLVI
    129
    XLVII
    131
    XLVIII
    137
    XLIX
    140
    L
    141
    LI
    144
    LII
    145
    LIII
    148
    LIV
    151
    LV
    153
    LVI
    161
    LVII
    163
    LIX
    167
    LX
    170
    LXI
    173
    LXII
    174
    LXIII
    178
    LXIV
    179
    LXV
    182
    LXVI
    186
    LXVII
    187
    LXVIII
    189
    LXX
    191
    LXXI
    194
    LXXII
    199
    LXXIII
    201
    LXXV
    202
    LXXVI
    207
    LXXVII
    211
    LXXVIII
    213
    LXXIX
    215
    LXXXI
    218
    LXXXII
    225
    LXXXIII
    233
    LXXXIV
    236
    LXXXVI
    238
    LXXXVII
    241
    LXXXVIII
    244
    LXXXIX
    246
    XC
    250
    XCI
    254
    XCII
    255
    XCIII
    257
    XCIV
    261
    XCV
    262
    XCVI
    265
    XCVII
    267
    XCVIII
    268
    C
    272
    CI
    273
    CX
    294
    CXI
    297
    CXII
    299
    CXIV
    304
    CXV
    307
    CXVI
    313
    CXVII
    317
    CXVIII
    323
    CXIX
    327
    CXX
    330
    CXXI
    336
    CXXII
    339
    CXXIII
    344
    CXXIV
    349
    CXXV
    353
    CXXVI
    356
    CXXVII
    361
    CXXVIII
    363
    CXXIX
    367
    CXXXI
    368
    CXXXII
    371
    CXXXIII
    374
    CXXXIV
    378
    CXXXV
    383
    CXXXVI
    386
    CXXXVII
    387
    CXXXVIII
    393
    CXXXIX
    397
    CXL
    399
    CXLII
    406
    CXLIII
    409
    CXLIV
    410
    CXLV
    414
    CXLVI
    415
    CXLVII
    416
    CXLVIII
    417
    CXLIX
    421
    CL
    424
    CLI
    429
    CLII
    431
    CLIII
    432
    CLIV
    436
    CLV
    438
    CLVI
    441
    CLVII
    444
    CLVIII
    448
    CLIX
    450
    CLX
    453
    CLXI
    457
    CLXII
    459
    CLXIII
    461
    CLXIV
    463
    CLXV
    464
    CLXVII
    466
    CLXVIII
    467
    CLXIX
    468
    CLXX
    471
    CLXXII
    472
    CLXXIII
    473
    CLXXIV
    479
    CLXXV
    481
    CLXXVI
    485
    CLXXVII
    486
    CLXXVIII
    488
    CLXXIX
    493
    CLXXX
    496
    CLXXXI
    498
    CLXXXII
    505
    CLXXXIII
    509
    CLXXXIV
    513
    CLXXXV
    517
    CLXXXVI
    518
    CLXXXVII
    528
    CLXXXVIII
    531
    CLXXXIX
    533
    CXC
    534
    CXCI
    537
    CXCII
    539
    CXCIII
    540
    CXCIV
    542
    CXCV
    548
    CXCVI
    552
    CXCVII
    557
    CXCVIII
    561
    Copyright

    Common terms and phrases

    Popular passages

    Page 575 - Matsui, Linear Cryptanalysis Method for DES Cipher, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT'93, pp.

    References to this book

    All Book Search results »

    Bibliographic information