庫存狀況
「香港二樓書店」讓您 愛上二樓●愛上書
我的購物車 加入會員 會員中心 常見問題 首頁
「香港二樓書店」邁向第一華人書店
登入 客戶評價 whatsapp 常見問題 加入會員 會員專區 現貨書籍 現貨書籍 購物流程 運費計算 我的購物車 聯絡我們 返回首頁
香港二樓書店 > 今日好書推介
二樓書籍分類
 
INTRODUCTION TO MODERN CRYPTOPRAPHY:PRINCIPLES AND PROTOCOLS

INTRODUCTION

沒有庫存
訂購需時10-14天
9781584885511
KATZ
全華科技
2008年1月01日
467.00  元
HK$ 443.65  






* 叢書系列:實用資訊
* 規格:精裝 / 552頁 / 普級 / 單色印刷 / 初版
* 出版地:台灣


實用資訊


[ 尚未分類 ]








  Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of modern cryptography, with a focus on formal definitions, precise assumptions, and rigorous proofs.The authors introduce the core principles of modern cryptography, including the modern, computational approach to security that overcomes the limitations of perfect secrecy. An extensive treatment of private-key encryption and message authentication follows. The authors also illustrate design principles for block ciphers, such as the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES), and present provably secure constructions of block ciphers from lower-level primitives. The second half of the book focuses on public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, El Gamal, and other cryptosystems. After exploring public-key encryption and digital signatures, the book concludes with a discussion of the random oracle model and its applications.Serving as a textbook, a reference, or for self-study, Introduction to Modern Cryptography presents the necessary tools to fully understand this fascinating subject.


Ch1: INTRODUCTION
Ch2: PERFECTLY SECRET ENCRYPTION
Ch3: PRIVATE-KEY ENCRYPTION AND PSEUDORANDOMNESS
Ch4: MESSAGE AUTHENTICATION CODES AND COLLISION-RESISTANT HASH FUNCTIONS
Ch5: PRACTICAL CONSTRUCTIONS OF PSEUDORANDOM PERMUTATIONS (BLOCK CIPHERS)
Ch6: THEORETICAL CONSTRUCTIONS OF PSEUDORANDOM OBJECTS
Ch7: NUMBER THEORY AND CRYPTOGRAPHIC HARDNESS ASSUMPTIONS
Ch8: FACTORING AND COMPUTING DISCRETE LOGARITHMS
Ch9: PRIVATE-KEY MANAGEMENT AND THE PUBLIC-KEY REVOLUTION
Ch10: PUBLIC-KEY ENCRYPTION
Ch11: ADDITIONAL PUBLIC-KEY ENCRYPTION SCHEMES
Ch12: DIGITAL SIGNATURE SCHEMES
Ch13: PUBLIC-KEY CRYPTOSYSTEMS IN THE RANDOM ORACLE MODEL
APPENDIX A: MATHEMATICAL BACKGROUND
APPENDIX B: SUPPLEMENTARY ALGORITHMIC NUMBER THEORY
References
Index




其 他 著 作