A Classical Introduction to Cryptography: Applications for Communications Security

Front Cover
Springer Science & Business Media, Sep 16, 2005 - Computers - 336 pages

A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes.

This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra and number theory for cryptologists; public key cryptography and cryptanalysis of these schemes; and other cryptographic protocols, e.g. secret sharing, zero-knowledge proofs and undeniable signature schemes.

A Classical Introduction to Cryptography: Applications for Communications Security is designed for upper-level undergraduate and graduate-level students in computer science. This book is also suitable for researchers and practitioners in industry. A separate exercise/solution booklet is available as well, please go to www.springeronline.com under author: Vaudenay for additional details on how to purchase this booklet.

 

What people are saying - Write a review

User Review - Flag as inappropriate

The book is very badly written with a shallow treatment of the subject.

Contents

II
1
V
2
VI
4
VII
7
VIII
8
IX
10
X
11
XI
12
CXX
173
CXXII
176
CXXIII
177
CXXIV
178
CXXV
181
CXXIX
182
CXXX
187
CXXXI
189

XII
13
XIII
15
XV
17
XVI
18
XVII
19
XIX
21
XXI
22
XXII
25
XXIV
26
XXV
27
XXVI
29
XXVII
30
XXX
31
XXXII
32
XXXIV
33
XXXV
36
XXXVI
37
XXXVII
40
XXXVIII
42
XXXIX
46
XL
48
XLI
50
XLII
51
XLIII
52
XLIV
53
XLV
54
XLVII
59
XLVIII
60
XLIX
63
LII
64
LIII
65
LIV
66
LV
67
LVI
70
LVII
74
LVIII
78
LIX
79
LX
80
LXI
82
LXII
86
LXIII
88
LXIV
90
LXV
92
LXVII
93
LXVIII
95
LXIX
97
LXXII
103
LXXIII
111
LXXIV
112
LXXV
114
LXXVI
120
LXXVII
123
LXXIX
125
LXXX
126
LXXXI
132
LXXXII
135
LXXXIV
136
LXXXVI
137
LXXXVIII
138
LXXXIX
140
XCII
141
XCIII
142
XCV
143
XCVI
145
XCIX
147
C
148
CI
150
CII
153
CIII
155
CVII
157
CVIII
158
CIX
159
CXI
160
CXII
161
CXIII
162
CXIV
166
CXV
167
CXVII
169
CXVIII
170
CXIX
172
CXXXIII
190
CXXXV
192
CXXXVI
194
CXXXVII
196
CXXXVIII
197
CXXXIX
199
CXL
200
CXLI
201
CXLII
202
CXLIII
203
CXLIV
204
CXLVI
205
CXLVII
210
CXLVIII
211
CXLIX
215
CL
218
CLII
220
CLV
221
CLVI
222
CLVIII
223
CLIX
224
CLX
225
CLXI
226
CLXII
229
CLXV
230
CLXVI
231
CLXVII
234
CLXVIII
235
CLXX
236
CLXXII
240
CLXXIII
241
CLXXVI
243
CLXXVII
244
CLXXVIII
246
CLXXIX
248
CLXXX
250
CLXXXI
253
CLXXXIV
255
CLXXXVI
256
CLXXXVII
257
CLXXXVIII
259
CLXXXIX
260
CXCII
262
CXCIII
263
CXCIV
264
CXCV
266
CXCVII
270
CXCVIII
274
CXCIX
277
CCIII
278
CCIV
280
CCV
282
CCVI
283
CCVII
284
CCVIII
285
CCIX
286
CCX
287
CCXI
288
CCXII
291
CCXIII
292
CCXIV
293
CCXV
295
CCXVII
296
CCXVIII
297
CCXIX
298
CCXX
299
CCXXI
300
CCXXII
301
CCXXIII
302
CCXXIV
304
CCXXVII
305
CCXXVIII
306
CCXXIX
308
CCXXX
310
CCXXXII
311
CCXXXIII
313
CCXXXIV
315
CCXXXV
329
Copyright

Other editions - View all

Common terms and phrases

Popular passages

Page 321 - R. Housley, W. Ford, W. Polk, D. Solo. Internet X.509 Public Key Infrastructure Certificate and CRL Profile.
Page 321 - Schweitzer, P., Results of an initial attempt to cryptanalyze the NBS Data Encryption Standard, Information Systems Lab.
Page 316 - Secure Hash Standard. Federal Information Processing Standard publication #180. US Department of Commerce, National Institute of Standards and Technology, 1993.