Welcome to STUDYtactics.com    
  BOOKS eCONTENT SPECIALTY STORES MY STUDYaides MY ACCOUNT  
New & Used Books
 
Memorial Day Holiday Customer Care Hours:
We will be closed on Monday, May 27.
Product Detail
Product Information   |  Other Product Information

Product Information
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Author: Stinson, Douglas
Edition/Copyright: 3RD 06
ISBN: 1-58488-508-4
Publisher: CRC Press I, LLC
Type: Paperback
Other Product Information
Summary
 
  Summary

The Advanced Encryption Standard (AES), elliptic curve DSA, the secure hash algorithm�these and other major advances made in recent years precipitated this comprehensive revision of the standard-setting text and reference, Cryptography: Theory and Practice.

Now more tightly focused on the core areas, it contains many additional topics as well as thoroughly updated treatments of topics presented in the first edition. There is increased emphasis on general concepts, but the outstanding features that first made this a bestseller all remain, including its mathematical rigor, numerous examples, pseudocode descriptions of algorithms, and clear, precise explanations.

Highlights of the Second Edition:"Explains the latest Federal Information Processing Standards, including the Advanced Encryption Standard (AES), the Secure Hash Algorithm (SHA-1), and the Elliptic Curve Digital Signature Algorithm (ECDSA)"Uses substitution-permutation networks to introduce block cipher design and analysis concepts"Explains both linear and differential cryptanalysis"Presents the Random Oracle model for hash functions"Addresses semantic security of RSA and Optional Asymmetric Encryption Padding"Discusses Wiener's attack on low decryption exponent RSA Overwhelmingly popular and relied upon in its first edition, now, more than ever, Cryptography: Theory and Practice provides an introduction to the field ideal for upper-level students in both mathematics and computer science.More highlights of the Second Edition:"Provably secure signature schemes: Full Domain Hash"Universal hash families"Expanded treatment of message authentication codes"More discussions on elliptic curves"Lower bounds for the complexity of generic algorithms for the discrete logarithm problem"Expanded treatment of factoring algorithms"Security definitions for signature schemes.

 

New & Used Books -  eContent -  Specialty Stores -  My STUDYaides -  My Account

Terms of Service & Privacy PolicyContact UsHelp © 1995-2024 STUDYtactics, All Rights Reserved