- 定價127.00元
-
8
折優惠:HK$101.6
|
|
INTRODUCTION TO MODERN CRYPTOPRAPHY:PRINCIPLES AND PROTOCOLS
|
|
沒有庫存 訂購需時10-14天
|
|
|
|
|
|
9781584885511 | |
|
|
|
KATZ | |
|
|
|
全華科技 | |
|
|
|
2008年1月01日
| |
|
|
|
467.00 元
| |
|
|
|
HK$ 443.65
|
|
|
|
|
| |
|
|
|
|
|
|
詳 細 資 料
|
* 叢書系列:實用資訊
* 規格:精裝 / 552頁 / 普級 / 單色印刷 / 初版
* 出版地:台灣
實用資訊
|
|
分 類
|
[ 尚未分類 ] |
同 類 書 推 薦
|
|
|
內 容 簡 介
|
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of modern cryptography, with a focus on formal definitions, precise assumptions, and rigorous proofs.The authors introduce the core principles of modern cryptography, including the modern, computational approach to security that overcomes the limitations of perfect secrecy. An extensive treatment of private-key encryption and message authentication follows. The authors also illustrate design principles for block ciphers, such as the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES), and present provably secure constructions of block ciphers from lower-level primitives. The second half of the book focuses on public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, El Gamal, and other cryptosystems. After exploring public-key encryption and digital signatures, the book concludes with a discussion of the random oracle model and its applications.Serving as a textbook, a reference, or for self-study, Introduction to Modern Cryptography presents the necessary tools to fully understand this fascinating subject.
|
|
目 錄
|
Ch1: INTRODUCTION
Ch2: PERFECTLY SECRET ENCRYPTION
Ch3: PRIVATE-KEY ENCRYPTION AND PSEUDORANDOMNESS
Ch4: MESSAGE AUTHENTICATION CODES AND COLLISION-RESISTANT HASH FUNCTIONS
Ch5: PRACTICAL CONSTRUCTIONS OF PSEUDORANDOM PERMUTATIONS (BLOCK CIPHERS)
Ch6: THEORETICAL CONSTRUCTIONS OF PSEUDORANDOM OBJECTS
Ch7: NUMBER THEORY AND CRYPTOGRAPHIC HARDNESS ASSUMPTIONS
Ch8: FACTORING AND COMPUTING DISCRETE LOGARITHMS
Ch9: PRIVATE-KEY MANAGEMENT AND THE PUBLIC-KEY REVOLUTION
Ch10: PUBLIC-KEY ENCRYPTION
Ch11: ADDITIONAL PUBLIC-KEY ENCRYPTION SCHEMES
Ch12: DIGITAL SIGNATURE SCHEMES
Ch13: PUBLIC-KEY CRYPTOSYSTEMS IN THE RANDOM ORACLE MODEL
APPENDIX A: MATHEMATICAL BACKGROUND
APPENDIX B: SUPPLEMENTARY ALGORITHMIC NUMBER THEORY
References
Index
|
|
|
書 評
|
|
|
|
|