9781138581340-1138581348-Introduction To Modern Cryptography, 2nd Edition

Introduction To Modern Cryptography, 2nd Edition

ISBN-13: 9781138581340
ISBN-10: 1138581348
Author: Yehuda Lindell, YEHUDA LINDELL JONATHAN KATZ
Publication date: 2018
Publisher: TAYLOR & FRANCIS
Format: Paperback 608 pages
FREE US shipping

Book details

ISBN-13: 9781138581340
ISBN-10: 1138581348
Author: Yehuda Lindell, YEHUDA LINDELL JONATHAN KATZ
Publication date: 2018
Publisher: TAYLOR & FRANCIS
Format: Paperback 608 pages

Summary

Introduction To Modern Cryptography, 2nd Edition (ISBN-13: 9781138581340 and ISBN-10: 1138581348), written by authors Yehuda Lindell, YEHUDA LINDELL JONATHAN KATZ, was published by TAYLOR & FRANCIS in 2018. With an overall rating of 3.7 stars, it's a notable title among other books. You can easily purchase or rent Introduction To Modern Cryptography, 2nd Edition (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography, including an extensive treatment of private-key encryption, message authentication codes, and hash functions. The authors also present design principles for widely used stream ciphers and block ciphers including RC4, DES, and AES, plus provide provable constructions of stream ciphers and block ciphers from lower-level primitives. The second half of the book covers public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, and El Gamal cryptosystems (and others), followed by a thorough treatment of several standardized public-key encryption and digital signature schemes.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book