Introduction to Modern Cryptography: Chapman & Hall/CRC Cryptography and Network Security Series
Autor Jonathan Katz, Yehuda Lindellen Limba Engleză Hardback – 21 dec 2020
Din seria Chapman & Hall/CRC Cryptography and Network Security Series
- 26% Preț: 1049.08 lei
- 9% Preț: 734.19 lei
- 31% Preț: 263.79 lei
- 12% Preț: 304.61 lei
- 9% Preț: 320.00 lei
- 21% Preț: 352.95 lei
- 30% Preț: 330.48 lei
- 11% Preț: 322.14 lei
- 23% Preț: 408.32 lei
- 31% Preț: 327.46 lei
- 31% Preț: 554.03 lei
- 26% Preț: 597.02 lei
- 31% Preț: 730.58 lei
- 20% Preț: 271.01 lei
- 26% Preț: 845.28 lei
Preț: 625.02 lei
Preț vechi: 905.60 lei
-31% Nou
Puncte Express: 938
Preț estimativ în valută:
119.60€ • 125.83$ • 99.03£
119.60€ • 125.83$ • 99.03£
Carte tipărită la comandă
Livrare economică 14-28 ianuarie 25
Livrare express 10-14 decembrie pentru 149.23 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780815354369
ISBN-10: 0815354363
Pagini: 648
Ilustrații: 50 Illustrations, black and white
Dimensiuni: 156 x 234 x 43 mm
Greutate: 1.08 kg
Ediția:Nouă
Editura: CRC Press
Colecția Chapman and Hall/CRC
Seria Chapman & Hall/CRC Cryptography and Network Security Series
ISBN-10: 0815354363
Pagini: 648
Ilustrații: 50 Illustrations, black and white
Dimensiuni: 156 x 234 x 43 mm
Greutate: 1.08 kg
Ediția:Nouă
Editura: CRC Press
Colecția Chapman and Hall/CRC
Seria Chapman & Hall/CRC Cryptography and Network Security Series
Cuprins
1. Introduction. 2. Perfectly Secret Encryption. 3. Private-Key Encryption. 4. Message Authentication Codes. 5. CCA-Security and Authenticated Encryption. 6. Hash Functions and Applications. 7. Practical Constructions of Symmetric-Key Primitives. 8. *Theoretical Constructions of Symmetric-Key Primitives. 9. Number Theory and Cryptographic Hardness Assumptions. 10. *Algorithms for Factoring and Computing Discrete Logarithms. 11. Key Management and the Public-Key Revolution. 12. Public-Key Encryption. 13. Digital Signature Schemes. 14. *Post-Quantum Cryptography. 15. *Advanced Topics in Public-Key Encryption.
Notă biografică
Jonathan Katz is Director, Maryland Cybersecurity Center and Professor, Department of Computer Science and UMIACS Department of Electrical and Computer Engineering at University of Maryland. He is the co-author with Yehuda Lindell of Introdution to Modern Cryptography, Second Edition, published by CRC Press.Vadim
Yehuda Lindell is a professor in the Department of Computer Science at Bar-Ilan University where he conducts research on cryptography with a focus on the theory of secure computation and its application in practice. Lindell received a Raviv Fellowship[1] and spent two years at IBM's cryptography research group at the T.J. Watson Research Center.
Yehuda Lindell is a professor in the Department of Computer Science at Bar-Ilan University where he conducts research on cryptography with a focus on the theory of secure computation and its application in practice. Lindell received a Raviv Fellowship[1] and spent two years at IBM's cryptography research group at the T.J. Watson Research Center.
Recenzii
The organization is quite natural, and aligns well with my course. My course covers the topics in exactly the same order as in Katz and Lindell, except that we skip some sections due to time constraints. I actually find Chapter 1 (Introduction) among the strongest aspects of this book. It does an excellent job discussing historical cryptography, explaining the motivation behind "modern cryptography," and introducing the non-expert to some of the basic concepts on which the rest of the contents of the book are built. I think this is an excellent textbook, and I can find very little fault with it. As I mentioned above, a possible suggestion is to add some more modern topics (lattice crypto, code-based crypto, FHE, obfuscation etc.) On the other hand, as an introductory textbook, it is perhaps also fine without those more advanced and more modern topics. - Gorjan Alagic
I find Chapters 2 and 5 to be the best. Both for its clarity. Chapter 2 is clear on certain details that, in my view, make the material much easier to understand than other treatments I have come across. E.g., clearly clarifying that when we consider the notion of "secret," we address the case only that one single message is sent. Not multiple messages. This really helps one quickly understand the technical details and proofs. Similarly, Chapter 5 on hash functions, in my view, is tricky to present. E.g., it must be clear that one is not dealing with a particular instance of a collision, but really finding collisions. This distinction is made very clearly in this book.- Mahesh Tripunitara
I find Chapters 2 and 5 to be the best. Both for its clarity. Chapter 2 is clear on certain details that, in my view, make the material much easier to understand than other treatments I have come across. E.g., clearly clarifying that when we consider the notion of "secret," we address the case only that one single message is sent. Not multiple messages. This really helps one quickly understand the technical details and proofs. Similarly, Chapter 5 on hash functions, in my view, is tricky to present. E.g., it must be clear that one is not dealing with a particular instance of a collision, but really finding collisions. This distinction is made very clearly in this book.- Mahesh Tripunitara
Descriere
Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal definitions, rigorous proofs of security.