Amazon cover image
Image from Amazon.com
Image from Google Jackets

Cryptography : theory and practice

By: Material type: TextTextLanguage: English Series: Discrete mathematics and its applicationsPublication details: London Chapman and Hall / CRC 2006Edition: 3Description: 593p. illISBN:
  • 9781584885085 (HB)
Subject(s):
Contents:
Chapter 1. Classical Cryptography Chapter 2. Shannon's Theory Chapter 3. Block Ciphers and the Advanced Encryption Standard Chapter 4. Cryptographic Hash Functions Chapter 5. The RSA Cryptosystem and Factoring Integers Chapter 6. Public-key Cryptography and Discrete Logarithms Chapter 7. Signature Schemes Chapter 8. Pseudo-random Number Generation Chapter 9. Identification Schemes and Entity Authentication Chapter 10. Key Distribution Chapter 11. Key Agreement Schemes Chapter 12. Public-key Infrastructure Chapter 13. Secret Sharing Schemes Chapter 14. Multicast Security and Copyright Protection
Summary: Offers coverage of the use of cryptographic protocols that establish the steps that must be taken before any type of secret transmission can be completed. This book shows readers how the various parties to the transaction establish their cryptographic identities or keys.
Item type: BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Home library Call number Materials specified Status Date due Barcode
IMSc Library 681.18 STI (Browse shelf(Opens below)) Available 60468

Includes index

Includes bibliography (p. 561-582) and references

Chapter 1. Classical Cryptography Chapter 2. Shannon's Theory Chapter 3. Block Ciphers and the Advanced Encryption Standard Chapter 4. Cryptographic Hash Functions Chapter 5. The RSA Cryptosystem and Factoring Integers Chapter 6. Public-key Cryptography and Discrete Logarithms Chapter 7. Signature Schemes Chapter 8. Pseudo-random Number Generation Chapter 9. Identification Schemes and Entity Authentication Chapter 10. Key Distribution Chapter 11. Key Agreement Schemes Chapter 12. Public-key Infrastructure Chapter 13. Secret Sharing Schemes Chapter 14. Multicast Security and Copyright Protection

Offers coverage of the use of cryptographic protocols that establish the steps that must be taken before any type of secret transmission can be completed. This book shows readers how the various parties to the transaction establish their cryptographic identities or keys.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India