## Cryptography: Theory and Practice, Third EditionThe Advanced Encryption Standard (AES), elliptic curve DSA, the secure hash algorithm...these and other major advances made in recent years precipitated this comprehensive revision of the standard-setting text and reference, Cryptography: Theory and Practice. Now more tightly focused on the core areas, it contains many additional topics as well as thoroughly updated treatments of topics presented in the first edition. There is increased emphasis on general concepts, but the outstanding features that first made this a bestseller all remain, including its mathematical rigor, numerous examples, pseudocode descriptions of algorithms, and clear, precise explanations. Highlights of the Second Edition: Overwhelmingly popular and relied upon in its first edition, now, more than ever, Cryptography: Theory and Practice provides an introduction to the field ideal for upper-level students in both mathematics and computer science. More highlights of the Second Edition: |

### What people are saying - Write a review

#### LibraryThing Review

User Review - nicodemo - LibraryThingI don't like this book. I find it too technical and more generally written in a really bad way. Moreover the typesetting is awful and the fonts in the formulas doesn't use the antialiasing, which of course make the book a pain even from an esthetic standpoint. Read full review

### Contents

I | 1 |

II | 3 |

III | 7 |

IV | 8 |

V | 12 |

VI | 13 |

VII | 18 |

VIII | 20 |

LXIV | 167 |

LXV | 168 |

LXVI | 171 |

LXVII | 181 |

LXVIII | 182 |

LXX | 184 |

LXXI | 187 |

LXXII | 192 |

IX | 25 |

X | 27 |

XI | 28 |

XII | 31 |

XIII | 34 |

XIV | 36 |

XV | 38 |

XVII | 45 |

XVIII | 46 |

XIX | 48 |

XX | 54 |

XXI | 56 |

XXII | 59 |

XXIII | 62 |

XXIV | 67 |

XXV | 70 |

XXVII | 73 |

XXVIII | 74 |

XXIX | 79 |

XXX | 80 |

XXXI | 82 |

XXXII | 85 |

XXXIII | 89 |

XXXIV | 95 |

XXXVI | 100 |

XXXVII | 102 |

XXXVIII | 103 |

XXXIX | 108 |

XL | 109 |

XLI | 112 |

XLII | 113 |

XLIII | 117 |

XLIV | 119 |

XLV | 120 |

XLVI | 121 |

XLVII | 125 |

XLVIII | 127 |

XLIX | 128 |

L | 133 |

LI | 136 |

LII | 138 |

LIII | 140 |

LIV | 141 |

LV | 144 |

LVI | 146 |

LVII | 149 |

LVIII | 150 |

LIX | 155 |

LX | 157 |

LXII | 162 |

LXIII | 164 |

LXXIII | 194 |

LXXV | 195 |

LXXVI | 200 |

LXXVII | 204 |

LXXVIII | 206 |

LXXIX | 208 |

LXXX | 209 |

LXXXI | 212 |

LXXXII | 218 |

LXXXIII | 219 |

LXXXIV | 226 |

LXXXV | 228 |

LXXXVI | 229 |

LXXXVII | 231 |

LXXXVIII | 234 |

LXXXIX | 237 |

XC | 239 |

XCI | 243 |

XCII | 247 |

XCIV | 250 |

XCV | 254 |

XCVI | 255 |

XCVII | 257 |

XCVIII | 259 |

XCIX | 261 |

CI | 264 |

CII | 265 |

CIII | 267 |

CIV | 268 |

CV | 274 |

CVI | 277 |

CVII | 279 |

CVIII | 280 |

CIX | 282 |

CX | 286 |

CXII | 288 |

CXIII | 291 |

CXIV | 292 |

CXVI | 297 |

CXVII | 300 |

CXVIII | 305 |

CXIX | 310 |

CXX | 311 |

CXXI | 315 |

317 | |

331 | |

333 | |

334 | |

335 | |

### Other editions - View all

### Common terms and phrases

adversary Affine Cipher assume attack binary representation bits bitstring choose chosen CK(x compress compute congruence consider construct cryptanalysis cryptography define denote describe determine Discrete Logarithm problem efficient ElGamal Signature Scheme elliptic curve encoding encryption function entropy equation EUCLIDEAN ALGORITHM finite field function h gcd(a given hash family hash function Hence Hill Cipher input inverse Iog2 iterated key schedule keystream length linear loga matrix message digest mod q modp modulo obtain one-way operation Oscar perfect secrecy permutation plaintext polynomial positive integer possible Preimage primitive element modulo private key probability distribution proof Prove public key quadratic residue quadratic residue modulo Rabin Rabin Cryptosystem random variable result rithm RSA Cryptosystem S-box Schnorr Signature Section Shift Cipher signed solution solve square roots stream cipher strongly universal Substitution Cipher success probability Suppose Alice valid pair valid signature vector verified Vigenere Cipher