A Classical Introduction to Cryptography: Applications for Communications Security

Front Cover
Springer Science & Business Media, Sep 16, 2005 - Computers - 336 pages
1 Review

A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes.

This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra and number theory for cryptologists; public key cryptography and cryptanalysis of these schemes; and other cryptographic protocols, e.g. secret sharing, zero-knowledge proofs and undeniable signature schemes.

A Classical Introduction to Cryptography: Applications for Communications Security is designed for upper-level undergraduate and graduate-level students in computer science. This book is also suitable for researchers and practitioners in industry. A separate exercise/solution booklet is available as well, please go to www.springeronline.com under author: Vaudenay for additional details on how to purchase this booklet.

 

What people are saying - Write a review

User Review - Flag as inappropriate

The book is very badly written with a shallow treatment of the subject.

Contents

II
1
III
2
IV
4
V
7
VI
8
VII
10
VIII
11
IX
12
CX
173
CXII
176
CXIII
177
CXIV
178
CXV
181
CXVI
182
CXVII
187
CXVIII
189

X
13
XI
15
XIII
17
XIV
18
XV
19
XVII
21
XVIII
22
XIX
25
XXI
26
XXII
27
XXIII
29
XXIV
30
XXVII
31
XXIX
32
XXXI
33
XXXII
36
XXXIII
37
XXXIV
40
XXXV
42
XXXVI
46
XXXVII
48
XXXVIII
50
XXXIX
51
XL
52
XLI
53
XLII
54
XLIV
59
XLV
60
XLVI
63
XLVII
64
XLVIII
65
XLIX
66
L
67
LI
70
LII
74
LIII
78
LIV
79
LV
80
LVI
82
LVII
86
LVIII
88
LIX
90
LX
92
LXII
93
LXIII
95
LXIV
97
LXV
103
LXVI
111
LXVII
112
LXVIII
114
LXIX
120
LXX
123
LXXII
125
LXXIII
126
LXXIV
132
LXXV
135
LXXVII
136
LXXIX
137
LXXXI
138
LXXXII
140
LXXXV
141
LXXXVI
142
LXXXVIII
143
LXXXIX
145
XCII
147
XCIII
148
XCIV
150
XCV
153
XCVI
155
XCVII
157
XCVIII
158
XCIX
159
CI
160
CII
161
CIII
162
CIV
166
CV
167
CVII
169
CVIII
170
CIX
172
CXX
190
CXXII
192
CXXIII
194
CXXIV
196
CXXV
197
CXXVI
199
CXXVII
200
CXXVIII
201
CXXIX
202
CXXX
203
CXXXI
204
CXXXIII
205
CXXXIV
210
CXXXV
211
CXXXVI
215
CXXXVII
218
CXXXIX
220
CXL
221
CXLI
222
CXLIII
223
CXLIV
224
CXLV
225
CXLVI
226
CXLVII
229
CXLVIII
230
CXLIX
231
CL
234
CLI
235
CLIII
236
CLV
240
CLVI
241
CLIX
243
CLX
244
CLXI
246
CLXII
248
CLXIII
250
CLXIV
253
CLXV
255
CLXVII
256
CLXVIII
257
CLXIX
259
CLXX
260
CLXXIII
262
CLXXIV
263
CLXXV
264
CLXXVI
266
CLXXVIII
270
CLXXIX
274
CLXXX
277
CLXXXI
278
CLXXXII
280
CLXXXIII
282
CLXXXIV
283
CLXXXV
284
CLXXXVI
285
CLXXXVII
286
CLXXXVIII
287
CLXXXIX
288
CXC
291
CXCI
292
CXCII
293
CXCIII
295
CXCIV
296
CXCV
297
CXCVI
298
CXCVII
299
CXCVIII
300
CXCIX
301
CC
302
CCI
304
CCIV
305
CCV
306
CCVI
308
CCVII
310
CCIX
311
CCX
313
CCXI
315
CCXII
329
Copyright

Other editions - View all

Common terms and phrases

Popular passages

Page 321 - R. Housley, W. Ford, W. Polk, D. Solo. Internet X.509 Public Key Infrastructure Certificate and CRL Profile.
Page 321 - Schweitzer, P., Results of an initial attempt to cryptanalyze the NBS Data Encryption Standard, Information Systems Lab.
Page 316 - Secure Hash Standard. Federal Information Processing Standard publication #180. US Department of Commerce, National Institute of Standards and Technology, 1993.

References to this book