000 03809cmm a2200445 i 4500
001 18343476
003 EBD74
005 20251226115302.0
008 141022s2015 flua b 001 0 eng
010 _a 2014039042
020 _a9781466570269
_qhardback
035 _a18343476
040 _aDLC
_beng
_cDLC
_erda
_dDLC
042 _apcc
050 0 0 _aQA76.9.A25
_bK36 2015
082 0 0 _a005.8/2
_223
084 _aCOM046000
_aCOM083000
_aMAT036000
_2bisacsh
100 1 _aKatz, Jonathan,
_d1974-
245 1 0 _aIntroduction to modern cryptography [EBOOK]
250 _a2
264 1 _aBoca Raton :
_bCRC Press/Taylor & Francis,
_c[2015]
300 _axx, 583 pages :
_billustrations ;
_c25 cm.
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
490 0 _aChapman & hall/crc cryptography and network security series
504 _aIncludes bibliographical references and index.
520 _a"Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography, including an extensive treatment of private-key encryption, message authentication codes, and hash functions. The authors also present design principles for widely used stream ciphers and block ciphers including RC4, DES, and AES, plus provide provable constructions of stream ciphers and block ciphers from lower-level primitives. The second half of the book covers public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, and El Gamal cryptosystems (and others), followed by a thorough treatment of several standardized public-key encryption and digital signature schemes. Integrating a more practical perspective without sacrificing rigor, this widely anticipated Second Edition offers improved treatment of:Stream ciphers and block ciphers, including modes of operation and design principlesAuthenticated encryption and secure communication sessionsHash functions, including hash-function applications and design principles Attacks on poorly implemented cryptography, including attacks on chained-CBC encryption, padding-oracle attacks, and timing attacksThe random-oracle model and its application to several standardized, widely used public-key encryption and signature schemesElliptic-curve cryptography and associated standards such as DSA/ECDSA and DHIES/ECIESContaining updated exercises and worked examples, Introduction to Modern Cryptography, Second Edition can serve as a textbook for undergraduate- or graduate-level courses in cryptography, a valuable reference for researchers and practitioners, or a general introduction suitable for self-study. "--
_cProvided by publisher.
650 0 _aComputer security.
650 0 _aCryptography.
650 7 _aCOMPUTERS / Operating Systems / General.
_2bisacsh
650 7 _aCOMPUTERS / Security / Cryptography.
_2bisacsh
650 7 _aMATHEMATICS / Combinatorics.
_2bisacsh
700 1 _aLindell, Yehuda.
856 _yClick here to online access
_uhttp://ebooks.amritanet.edu:4991/EBOOKS/EBD74_IntroductiontoModernCryptography_JonathanKatz_YehudaLindell.pdf
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2udc
_cEBK
_n0
999 _c453120
_d453120