9780130618146-0130618144-Introduction to Cryptography with Coding Theory

Introduction to Cryptography with Coding Theory

ISBN-13: 9780130618146
ISBN-10: 0130618144
Edition: First Edition
Author: Wade Trappe, Lawrence C. Washington
Publication date: 2002
Publisher: Pearson College Div
Format: Hardcover 490 pages
FREE US shipping
Rent
35 days
from $21.69 USD
FREE shipping on RENTAL RETURNS
Buy

From $31.43

Rent

From $21.69

Book details

ISBN-13: 9780130618146
ISBN-10: 0130618144
Edition: First Edition
Author: Wade Trappe, Lawrence C. Washington
Publication date: 2002
Publisher: Pearson College Div
Format: Hardcover 490 pages

Summary

Introduction to Cryptography with Coding Theory (ISBN-13: 9780130618146 and ISBN-10: 0130618144), written by authors Wade Trappe, Lawrence C. Washington, was published by Pearson College Div in 2002. With an overall rating of 4.1 stars, it's a notable title among other Systems Analysis & Design (Computer Science, Software Design, Testing & Engineering, Programming, Security & Encryption, Mathematics, Communication & Media Studies, Social Sciences) books. You can easily purchase or rent Introduction to Cryptography with Coding Theory (Hardcover, Used) from BooksRun, along with many other new and used Systems Analysis & Design books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.52.

Description

This book assumes a minimal background in programming and a level of math sophistication equivalent to a course in linear algebra. It provides a flexible organization, as each chapter is modular and can be covered in any order. Using Mathematica, Maple, and MATLAB, computer examples included in an Appendix explain how to do computation and demonstrate important concepts. A full chapter on error correcting codes introduces the basic elements of coding theory. Other topics covered: Classical cryptosystems, basic number theory, the data encryption standard, AES: Rijndael, the RSA algorithm, discrete logarithms, digital signatures, e-commerce and digital cash, secret sharing schemes, games, zero knowledge techniques, key establishment protocols, information theory, elliptic curves, error correcting codes, quantum cryptography. For professionals in cryptography and network security.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book