Public-Key Cryptography
Seiten
1996
|
2nd enlarged ed. 1996
Springer Berlin (Verlag)
978-3-540-61356-5 (ISBN)
Springer Berlin (Verlag)
978-3-540-61356-5 (ISBN)
This book gives a broad overview of public-key cryptography, covering its essence and advantages, various public-key cryptosystems and protocols. It also gives a comprehensive introduction to classical cryptography and cryptanalysis. The book is self-contained and suitable both as a text and as a reference. It starts from the beginning but also includes some 1989 developments. The presentation is in many ways new, with some new results. The treatment is rigorous but avoids unnecessary formalism. The plaintext examples in the book form a package of basic knowledge.
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. The second edition has been revised and enlarged especially in its treatment of cryptographic protocols. From a review of the first edition: "This is a comprehensive review ... there can be no doubt that this will be accepted as a standard text. At the same time, it is clearly and entertainingly written ... and can certainly stand alone." Alex M. Andrew, Kybernetes, March 1992
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. The second edition has been revised and enlarged especially in its treatment of cryptographic protocols. From a review of the first edition: "This is a comprehensive review ... there can be no doubt that this will be accepted as a standard text. At the same time, it is clearly and entertainingly written ... and can certainly stand alone." Alex M. Andrew, Kybernetes, March 1992
1. Classical Two-Way Cryptography.- 2. The Idea of Public Keys.- 3. Knapsack Systems.- 4. RSA.- 5. Other Bases of Cryptosystems.- 6. Cryptographic Protocols: Surprising Vistas for Communication.- Appendix A. Tutorial in Complexity Theory.- Appendix B. Tutorial in Number Theory.- Problems.- Historical and Bibliographical Remarks.- References.
Erscheint lt. Verlag | 25.10.1996 |
---|---|
Reihe/Serie | Texts in Theoretical Computer Science. An EATCS Series |
Zusatzinfo | X, 275 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 538 g |
Themenwelt | Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik |
Schlagworte | Communication • communication (X) • Complexity • Computer • Cryptanalysis • cryptography • cryptosystems (X) • Knapsack-Systeme • Kommunikation • Kryptanalyse • Kryptographie / Kryptologie • Kryptosysteme • protocols • Protokoll |
ISBN-10 | 3-540-61356-0 / 3540613560 |
ISBN-13 | 978-3-540-61356-5 / 9783540613565 |
Zustand | Neuware |
Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Schulbuch Klassen 7/8 (G9)
Buch | Hardcover (2015)
Klett (Verlag)
31,50 €
Buch | Softcover (2004)
Cornelsen Verlag
25,99 €
Buch (2007)
Europa-Lehrmittel (Verlag)
24,90 €