Cryptography and Secure Communication

Cryptography and Secure Communication

5 (1 rating by Goodreads)
By (author) 

List price: US$210.00

Currently unavailable

We can notify you when this item is back in stock

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks

Description

Today's pervasive computing and communications networks have created an intense need for secure and reliable cryptographic systems. Bringing together a fascinating mixture of topics in engineering, mathematics, computer science, and informatics, this book presents the timeless mathematical theory underpinning cryptosystems both old and new. Major branches of classical and modern cryptography are discussed in detail, from basic block and stream cyphers through to systems based on elliptic and hyperelliptic curves, accompanied by concise summaries of the necessary mathematical background. Practical aspects such as implementation, authentication and protocol-sharing are also covered, as are the possible pitfalls surrounding various cryptographic methods. Written specifically with engineers in mind, and providing a solid grounding in the relevant algorithms, protocols and techniques, this insightful introduction to the foundations of modern cryptography is ideal for graduate students and researchers in engineering and computer science, and practitioners involved in the design of security systems for communications networks.show more

Product details

  • Electronic book text
  • CAMBRIDGE UNIVERSITY PRESS
  • Cambridge University Press (Virtual Publishing)
  • Cambridge, United Kingdom
  • English
  • 77 b/w illus. 230 exercises
  • 113901367X
  • 9781139013673

Table of contents

1. Introduction; 2. The integers; 3. Cryptography based on the integer ring; 4. Cryptography based on the discrete logarithm; 5. Information-theoretic methods in cryptography; 6. Block ciphers; 7. Stream ciphers; 8. Authentication and ownership protection; 9. Groups, rings, and fields; 10. Cryptography based on elliptic curves; 11. Cryptography based on hyperelliptic curves; 12. Cryptography based on bilinear pairings; 13. Implementation; 14. Cryptographic protocols for security and identification; 15. More public-key cryptography.show more

Rating details

1 ratings
5 out of 5 stars
5 100% (1)
4 0% (0)
3 0% (0)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X