Picture 1 of 1

Gallery
Picture 1 of 1

Have one to sell?
Introduction to Cryptography with Coding Theory: United States Edition by Wade T
US $64.99
ApproximatelyEUR 56.93
or Best Offer
Condition:
New
A new, unread, unused book in perfect condition with no missing or damaged pages. See the seller's listing for full details.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Postage:
US $5.97 (approx EUR 5.23) USPS Media MailTM.
Located in: Little Rock, Arkansas, United States
Delivery:
Estimated between Wed, 6 Aug and Wed, 13 Aug
Returns:
No returns accepted.
Payments:
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:167091431607
Item specifics
- Condition
- Book Title
- Introduction to Cryptography with Coding Theory
- ISBN-13
- 9780131862395
- Country/Region of Manufacture
- United States
- ISBN
- 9780131862395
About this product
Product Identifiers
Publisher
Pearson Education
ISBN-10
0131862391
ISBN-13
9780131862395
eBay Product ID (ePID)
45882293
Product Key Features
Number of Pages
600 Pages
Publication Name
Introduction to Cryptography with Coding Theory
Language
English
Subject
Communication Studies, General, Security / Networking
Publication Year
2005
Type
Textbook
Subject Area
Mathematics, Computers, Language Arts & Disciplines
Format
Hardcover
Dimensions
Item Height
1.5 in
Item Weight
40.3 Oz
Item Length
9.6 in
Item Width
7.4 in
Additional Product Features
Edition Number
2
Intended Audience
College Audience
LCCN
2005-048930
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.82
Table Of Content
1 Overview Secure Communications. Cryptographic Applications 2 Classical Cryptosystems. Shift Ciphers. Affine Ciphers. The Vigen'ere Cipher. Substitution Ciphers. Sherlock Holmes. The Playfair and ADFGX Ciphers. Block Ciphers. Binary Numbers and ASCII. One-Time Pads. Pseudo-random Bit Generation. LFSR Sequences. Enigma. Exercises. Computer Problems. 3 Basic Number Theory. Basic Notions. Solving ax + by = d. Congruences. The Chinese Remainder Theorem. Modular Exponentiation. Fermat and Euler. Primitive Roots. Inverting Matrices Mod n. Square Roots Mod n. Legendre and Jacobi Symbols. Finite Fields. Continued Fractions. Exercises. Computer Problems. 4 The Data Encryption Standard Introduction. A Simplified DES-Type Algorithm. Differential Cryptanalysis. DES. Modes of Operation. Breaking DES. Meet-in-the-Middle Attacks. Password Security. Exercises. 5 AES: Rijndael The Basic Algorithm. The Layers. Decryption. Design Considerations. 6 The RSA Algorithm The RSA Algorithm. Attacks on RSA. Primality Testing. Factoring. The RSA Challenge. An Application to Treaty Verification. The Public Key Concept. Exercises. Computer Problems 7 Discrete Logarithms Discrete Logarithms. Computing Discrete Logs. Bit Commitment Diffie-Hellman Key Exchange. ElGamal Public Key Cryptosystems. Exercises. Computer Problems. 8 Hash Functions Hash Functions. A Simple Hash Example. The Secure Hash Algorithm. Birthday Attacks. Multicollisions. The Random Oracle Model. Using Hash Functions to Encrypt. 9 Digital Signatures RSA Signatures. The ElGamal Signature Scheme. Hashing and Signing. Birthday Attacks on Signatures. The Digital Signature Algorithm. Exercises. Computer Problems. 10 Security Protocols Intruders-in-the-Middle and Impostors. Key Distribution. Kerberos Public Key Infrastructures (PKI). X.509 Certificates. Pretty Good Privacy. SSL and TLS. Secure Electronic Transaction. Exercises. 11 Digital Cash Digital Cash. Exercises. 12 Secret Sharing Schemes Secret Splitting. Threshold Schemes. Exercises. Computer Problems. 13 Games Flipping Coins over the Telephone. Poker over the Telephone. Exercises. 14 Zero-Knowledge Techniques The Basic Setup. The Feige-Fiat-Shamir Identification Scheme. Exercises. 15 Information Theory Probability Review. Entropy. Huffman Codes. Perfect Secrecy. The Entropy of English. Exercises. 16 Elliptic Curves The Addition Law. Elliptic Curves Mod n. Factoring with Elliptic Curves. Elliptic Curves in Characteristic 2. Elliptic Curve Cryptosystems. Identity-Based Encryption. Exercises. Computer Problems. 17 Lattice Methods Lattices. Lattice Reduction. An Attack on RSA. NTRU. Exercises 18 Error Correcting Codes Introduction. Error Correcting Codes. Bounds on General Codes. Linear Codes. Hamming Codes. Golay Codes. Cyclic Codes. BCH Codes. Reed-Solomon Codes. The McEliece Cryptosystem. Other Topics. Exercises. Computer Problems. 19 Quantum Techniques in Cryptography A Quantum Experiment. Quantum Key Distribution. Shor's Algorithm. 4 Exercises. Mathematica Examples Maple Examples MATLAB Examples Further Reading Bibliography Index
Synopsis
With its conversational tone and practical focus, this text mixes applied and theoretical aspects for a solid introduction to cryptography and security, including the latest significant advancements in the field. Assumes a minimal background. The level of math sophistication is equivalent to a course in linear algebra. Presents applications and protocols where cryptographic primitives are used in practice, such as SET and SSL. Provides a detailed explanation of AES, which has replaced Feistel-based ciphers (DES) as the standard block cipher algorithm. Includes expanded discussions of block ciphers, hash functions, and multicollisions, plus additional attacks on RSA to make readers aware of the strengths and shortcomings of this popular scheme. For engineers interested in learning more about cryptography., With its lively, conversational tone and practical focus, this edition mixes applied and theoretical aspects for a solid introduction to cryptography and security, including the latest significant advancements in the field., With its conversational tone and practical focus, this text mixes applied and theoretical aspects for a solid introduction to cryptography and security, including the latest significant advancements in the field. KEY TOPICS: Assumes a minimal background. The level of math sophistication is equivalent to a course in linear algebra. Presents applications and protocols where cryptographic primitives are used in practice, such as SET and SSL. Provides a detailed explanation of AES, which has replaced Feistel-based ciphers (DES) as the standard block cipher algorithm. Includes expanded discussions of block ciphers, hash functions, and multicollisions, plus additional attacks on RSA to make readers aware of the strengths and shortcomings of this popular scheme. MARKET: For engineers interested in learning more about cryptography., With its lively, conversational tone and practical focus, this new edition mixes applied and theoretical aspects for a solid introduction to cryptography and security, including the latest significant advancements in the field.
LC Classification Number
QA268.T73 2005
Item description from the seller
About this seller
faye_3048
98.6% positive Feedback•402 items sold
Registered as a private sellerThereby, consumer rights stemming from EU consumer protection law do not apply. eBay buyer protection still applies to most purchases.
Seller Feedback (70)
- l***e (1475)- Feedback left by buyer.Past monthVerified purchaseA+++ Seller!!! Item delivered promptly and arrived as advertised. Excellent!!!
- 4***4 (159)- Feedback left by buyer.Past monthVerified purchaseThanks a lot,im glad to found a original parts for my very old welder
- a***i (5672)- Feedback left by buyer.Past monthVerified purchaseThanks for listing them
More to explore:
- United States Maps & Atlases,
- United States Maps & Atlases in English,
- United States Michelin Maps & Atlases,
- Literary Theory Books,
- United States Folding Map Maps & Atlases,
- Game Theory Non-Fiction Hardcover Books,
- Art & Culture Literary Theory Non-Fiction Hardcover Books in English,
- The Official Highway Code Non-Fiction Books,
- Limited Edition Vogue Magazines,
- Playboy Limited Edition Magazines