Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography, including an extensive treatment of private-key encryption, ...
Read More
Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography, including an extensive treatment of private-key encryption, message authentication codes, and hash functions. The authors also present design principles for widely used stream ciphers and block ciphers including RC4, DES, and AES, plus provide provable constructions of stream ciphers and block ciphers from lower-level primitives. The second half of the book covers public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, and El Gamal cryptosystems (and others), followed by a thorough treatment of several standardized public-key encryption and digital signature schemes. Integrating a more practical perspective without sacrificing rigor, this widely anticipated Second Edition offers improved treatment of: Stream ciphers and block ciphers, including modes of operation and design principles Authenticated encryption and secure communication sessions Hash functions, including hash-function applications and design principles Attacks on poorly implemented cryptography, including attacks on chained-CBC encryption, padding-oracle attacks, and timing attacks The random-oracle model and its application to several standardized, widely used public-key encryption and signature schemes Elliptic-curve cryptography and associated standards such as DSA/ECDSA and DHIES/ECIES Containing updated exercises and worked examples, Introduction to Modern Cryptography, Second Edition can serve as a textbook for undergraduate- or graduate-level courses in cryptography, a valuable reference for researchers and practitioners, or a general introduction suitable for self-study.
Read Less
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Fair. Book has internal/external wear and/or highlighting and underlining. It may have creases on the cover and some folded pages. This is a USED book. Codes have been used. This is a USED book, it is subject to external and interior wear including, underlining, highlighting, annotations, water damage, minor scuffs and tears. This is a donated book accepted as is. Stickers and sticker residue on the cover should be expected, as well as spine wear from use. There are NO codes or disc(s) included. All items ship Monday-Friday within 2-3 business days. Thank you for supporting Goodwill of OC.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Expedited orders RECEIVED in 1-5 business days within the United States. Orders ship SAME or NEXT business day. We proudly ship to APO/FPO addresses. 100% Satisfaction Guaranteed!
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Ships in a BOX from Central Missouri! May not include working access code. Will not include dust jacket. Has used sticker(s) and some writing or highlighting. UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes).
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Fair. Either: "Missing Dust Jacket" OR "Somewhat Damaged", meeting Alibris criteria for acceptable. Leaves our warehouse same or next business day. Most continental U.S. orders lead time 4-10 business days. Thank you for your business.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Contains: Illustrations, black & white. Chapman & Hall/CRC Cryptography and Network Security Series . Includes: illustrations, black & white. Intended for college/higher education audience. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Contains: Illustrations, black & white. Chapman & Hall/CRC Cryptography and Network Security Series . Includes: illustrations, black & white. Intended for college/higher education audience. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers.