Cryptography: Theory and Practice (Textbooks in Mathematics)
ISBN-13:
9781138197015
ISBN-10:
1138197017
Edition:
4
Author:
Douglas Robert Stinson, Maura Paterson
Publication date:
2018
Publisher:
CRC Press
Format:
Hardcover
598 pages
Category:
Encryption
,
Security & Encryption
,
Cryptography
FREE US shipping
Rent
35 days
Due May 31, 2024
35 days
from $34.55
USD
Book details
ISBN-13:
9781138197015
ISBN-10:
1138197017
Edition:
4
Author:
Douglas Robert Stinson, Maura Paterson
Publication date:
2018
Publisher:
CRC Press
Format:
Hardcover
598 pages
Category:
Encryption
,
Security & Encryption
,
Cryptography
Summary
Cryptography: Theory and Practice (Textbooks in Mathematics) (ISBN-13: 9781138197015 and ISBN-10: 1138197017), written by authors
Douglas Robert Stinson, Maura Paterson, was published by CRC Press in 2018.
With an overall rating of 3.9 stars, it's a notable title among other
Encryption
(Security & Encryption, Cryptography) books. You can easily purchase or rent Cryptography: Theory and Practice (Textbooks in Mathematics) (Hardcover) from BooksRun,
along with many other new and used
Encryption
books
and textbooks.
And, if you're looking to sell your copy, our current buyback offer is $7.21.
Description
Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject’s fundamentals while presenting the most current advances in cryptography.
The authors offer comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating around the world.
Key Features of the Fourth Edition:
- New chapter on the exciting, emerging new area of post-quantum cryptography (Chapter 9).
- New high-level, nontechnical overview of the goals and tools of cryptography (Chapter 1).
- New mathematical appendix that summarizes definitions and main results on number theory and algebra (Appendix A).
- An expanded treatment of stream ciphers, including common design techniques along with coverage of Trivium.
- Interesting attacks on cryptosystems, including:
- padding oracle attack
- correlation attacks and algebraic attacks on stream ciphers
- attack on the DUAL-EC random bit generator that makes use of a trapdoor.
- A treatment of the sponge construction for hash functions and its use in the new SHA-3 hash standard.
- Methods of key distribution in sensor networks.
- The basics of visual cryptography, allowing a secure method to split a secret visual message into pieces (shares) that can later be combined to reconstruct the secret.
- The fundamental techniques cryptocurrencies, as used in Bitcoin and blockchain.
- The basics of the new methods employed in messaging protocols such as Signal, including deniability and Diffie-Hellman key ratcheting.
We would LOVE it if you could help us and other readers by reviewing the book
Book review
Congratulations! We have received your book review.
{user}
{createdAt}
by {truncated_author}