Modern Cryptography Primer: Theoretical Foundations and Practical Applications

Note moyenne 0
( 0 avis fournis par Goodreads )
 
9783642413858: Modern Cryptography Primer: Theoretical Foundations and Practical Applications

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these areas, offering an understanding of the essential, most important, and most interesting ideas, based on the authors' teaching and research experience.

After introducing the basic mathematical and computational complexity concepts, and some historical context, including the story of Enigma, the authors explain symmetric and asymmetric cryptography, electronic signatures and hash functions, PGP systems, public key infrastructures, cryptographic protocols, and applications in network security. In each case the text presents the key technologies, algorithms, and protocols, along with methods of design and analysis, while the content is characterized by a visual style and all algorithms are presented in readable pseudocode or using simple graphics and diagrams.

The book is suitable for undergraduate and graduate courses in computer science and engineering, particularly in the area of networking, and it is also a suitable reference text for self-study by practitioners and researchers. The authors assume only basic elementary mathematical experience, the text covers the foundational mathematics and computational complexity theory.

Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.

About the Author :

Czesław Kościelny is a professor in the Department of Cryptography of Wrocław University of Applied Informatics.

Mirosław Kurkowski is a professor in the Institute of Computer and Information Sciences of Czestochowa University of Technology.

Marian Srebrny is a professor in the Institute of Computer Science of the Polish Academy of Sciences.

Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.

Acheter neuf Afficher le livre
EUR 46,17

Autre devise

Frais de port : EUR 3,39
De Royaume-Uni vers Etats-Unis

Destinations, frais et délais

Ajouter au panier

Meilleurs résultats de recherche sur AbeBooks

1.

Czeslaw Koscielny, Miroslaw Kurkowski, Marian Srebrny
Edité par Springer Berlin Heidelberg 2013-12-03, Berlin, Heidelberg (2013)
ISBN 10 : 3642413854 ISBN 13 : 9783642413858
Neuf(s) Couverture rigide Quantité : > 20
Vendeur
Blackwell's
(Oxford, OX, Royaume-Uni)
Evaluation vendeur
[?]

Description du livre Springer Berlin Heidelberg 2013-12-03, Berlin, Heidelberg, 2013. hardback. État : New. N° de réf. du libraire 9783642413858

Plus d'informations sur ce vendeur | Poser une question au libraire

Acheter neuf
EUR 46,17
Autre devise

Ajouter au panier

Frais de port : EUR 3,39
De Royaume-Uni vers Etats-Unis
Destinations, frais et délais

2.

Czeslaw Koscielny
Edité par Springer-Verlag Berlin and Heidelberg GmbH and Co. KG (2013)
ISBN 10 : 3642413854 ISBN 13 : 9783642413858
Neuf(s) Quantité : > 20
impression à la demande
Vendeur
Pbshop
(Wood Dale, IL, Etats-Unis)
Evaluation vendeur
[?]

Description du livre Springer-Verlag Berlin and Heidelberg GmbH and Co. KG, 2013. HRD. État : New. New Book.Shipped from US within 10 to 14 business days.THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de réf. du libraire IP-9783642413858

Plus d'informations sur ce vendeur | Poser une question au libraire

Acheter neuf
EUR 52,96
Autre devise

Ajouter au panier

Frais de port : EUR 3,34
Vers Etats-Unis
Destinations, frais et délais

3.

Ko cielny, Czes aw / Kurkowski, Miros aw
ISBN 10 : 3642413854 ISBN 13 : 9783642413858
Neuf(s) Quantité : 1
Vendeur
European-Media-Service Mannheim
(Mannheim, Allemagne)
Evaluation vendeur
[?]

Description du livre État : New. Publisher/Verlag: Springer, Berlin | Theoretical Foundations and Practical Applications | This book covers applied cryptography in computerized telecommunication networks. The authors present key technologies, algorithms, protocols, and methods of design and analysis, rendering algorithms in readable pseudocode and simple graphics and diagrams. | Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these areas, offering an understanding of the essential, most important, and most interesting ideas, based on the authors' teaching and research experience.After introducing the basic mathematical and computational complexity concepts, and some historical context, including the story of Enigma, the authors explain symmetric and asymmetric cryptography, electronic signatures and hash functions, PGP systems, public key infrastructures, cryptographic protocols, and applications in network security. In each case the text presents the key technologies, algorithms, and protocols, along with methods of design and analysis, while the content is characterized by a visual style and all algorithms are presented in readable pseudocode or using simple graphics and diagrams.The book is suitable for undergraduate and graduate courses in computer science and engineering, particularly in the area of networking, and it is also a suitable reference text for self-study by practitioners and researchers. The authors assume only basic elementary mathematical experience, the text covers the foundational mathematics and computational complexity theory. | Chap. 1 Basic Concepts and Historical Overview.- Chap. 2 Mathematical Foundations of Cryptography.- Chap. 3 Foundations of Symmetric Cryptography.- Chap. 4 Foundations of Asymmetric Cryptography.- Chap. 5 An Electronic Signature and Hash Functions.- Chap. 6 PGP Systems and True Crypt.- Chap. 7 Public Key Infrastructure.- Chap. 8 Cryptographic Protocols.- Chap. 9 Cryptography Application for Data Security.- References.- Index. | Format: Hardback | Language/Sprache: english | 516 gr | 235x160x20 mm | 238 pp. N° de réf. du libraire K9783642413858

Plus d'informations sur ce vendeur | Poser une question au libraire

Acheter neuf
EUR 56,90
Autre devise

Ajouter au panier

Frais de port : EUR 2,99
De Allemagne vers Etats-Unis
Destinations, frais et délais

4.

Kościelny, Czesław
Edité par Springer (2016)
ISBN 10 : 3642413854 ISBN 13 : 9783642413858
Neuf(s) Paperback Quantité : 1
impression à la demande
Vendeur
Ria Christie Collections
(Uxbridge, Royaume-Uni)
Evaluation vendeur
[?]

Description du livre Springer, 2016. Paperback. État : New. PRINT ON DEMAND Book; New; Publication Year 2016; Not Signed; Fast Shipping from the UK. No. book. N° de réf. du libraire ria9783642413858_lsuk

Plus d'informations sur ce vendeur | Poser une question au libraire

Acheter neuf
EUR 56,78
Autre devise

Ajouter au panier

Frais de port : EUR 4,37
De Royaume-Uni vers Etats-Unis
Destinations, frais et délais

5.

CZESłAW KOśCIELNY
Edité par Springer (2013)
ISBN 10 : 3642413854 ISBN 13 : 9783642413858
Neuf(s) Couverture rigide Quantité : 1
Vendeur
Herb Tandree Philosophy Books
(Stroud, GLOS, Royaume-Uni)
Evaluation vendeur
[?]

Description du livre Springer, 2013. Hardback. État : NEW. 9783642413858 This listing is a new book, a title currently in-print which we order directly and immediately from the publisher. N° de réf. du libraire HTANDREE0409185

Plus d'informations sur ce vendeur | Poser une question au libraire

Acheter neuf
EUR 52,38
Autre devise

Ajouter au panier

Frais de port : EUR 9,04
De Royaume-Uni vers Etats-Unis
Destinations, frais et délais

6.

Czeslaw Koscielny
Edité par Springer-Verlag Berlin and Heidelberg GmbH and Co. KG (2013)
ISBN 10 : 3642413854 ISBN 13 : 9783642413858
Neuf(s) Quantité : > 20
impression à la demande
Vendeur
Books2Anywhere
(Fairford, GLOS, Royaume-Uni)
Evaluation vendeur
[?]

Description du livre Springer-Verlag Berlin and Heidelberg GmbH and Co. KG, 2013. HRD. État : New. New Book. Delivered from our US warehouse in 10 to 14 business days. THIS BOOK IS PRINTED ON DEMAND.Established seller since 2000. N° de réf. du libraire IP-9783642413858

Plus d'informations sur ce vendeur | Poser une question au libraire

Acheter neuf
EUR 55,24
Autre devise

Ajouter au panier

Frais de port : EUR 10,17
De Royaume-Uni vers Etats-Unis
Destinations, frais et délais

7.

Czeslaw Koscielny
Edité par Springer-Verlag Gmbh Dez 2013 (2013)
ISBN 10 : 3642413854 ISBN 13 : 9783642413858
Neuf(s) Quantité : 1
Vendeur
Evaluation vendeur
[?]

Description du livre Springer-Verlag Gmbh Dez 2013, 2013. Buch. État : Neu. Neuware - Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these areas, offering an understanding of the essential, most important, and most interesting ideas, based on the authors' teaching and research experience. After introducing the basic mathematical and computational complexity concepts, and some historical context, including the story of Enigma, the authors explain symmetric and asymmetric cryptography, electronic signatures and hash functions, PGP systems, public key infrastructures, cryptographic protocols, and applications in network security. In each case the text presents the key technologies, algorithms, and protocols, along with methods of design and analysis, while the content is characterized by a visual style and all algorithms are presented in readable pseudocode or using simple graphics and diagrams. The book is suitable for undergraduate and graduate courses in computer science and engineering, particularly in the area of networking, and it is also a suitable reference text for self-study by practitioners and researchers. The authors assume only basic elementary mathematical experience, the text covers the foundational mathematics and computational complexity theory. 250 pp. Englisch. N° de réf. du libraire 9783642413858

Plus d'informations sur ce vendeur | Poser une question au libraire

Acheter neuf
EUR 53,49
Autre devise

Ajouter au panier

Frais de port : EUR 12
De Allemagne vers Etats-Unis
Destinations, frais et délais

8.

Ko?cielny, Czeslaw
Edité par Springer (2017)
ISBN 10 : 3642413854 ISBN 13 : 9783642413858
Neuf(s) Couverture rigide Quantité : > 20
impression à la demande
Vendeur
Murray Media
(North Miami Beach, FL, Etats-Unis)
Evaluation vendeur
[?]

Description du livre Springer, 2017. Hardcover. État : New. Never used! This item is printed on demand. N° de réf. du libraire 3642413854

Plus d'informations sur ce vendeur | Poser une question au libraire

Acheter neuf
EUR 65,11
Autre devise

Ajouter au panier

Frais de port : EUR 1,66
Vers Etats-Unis
Destinations, frais et délais

9.

Czeslaw Ko?cielny; Miroslaw Kurkowski; Marian Srebrny
Edité par Springer (2013)
ISBN 10 : 3642413854 ISBN 13 : 9783642413858
Neuf(s) Couverture rigide Quantité : 1
Vendeur
Irish Booksellers
(Rumford, ME, Etats-Unis)
Evaluation vendeur
[?]

Description du livre Springer, 2013. Hardcover. État : New. book. N° de réf. du libraire M3642413854

Plus d'informations sur ce vendeur | Poser une question au libraire

Acheter neuf
EUR 66,86
Autre devise

Ajouter au panier

Frais de port : Gratuit
Vers Etats-Unis
Destinations, frais et délais

10.

Czeslaw Koscielny
Edité par Springer-Verlag Gmbh Dez 2013 (2013)
ISBN 10 : 3642413854 ISBN 13 : 9783642413858
Neuf(s) Quantité : 1
Vendeur
Agrios-Buch
(Bergisch Gladbach, Allemagne)
Evaluation vendeur
[?]

Description du livre Springer-Verlag Gmbh Dez 2013, 2013. Buch. État : Neu. Neuware - Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these areas, offering an understanding of the essential, most important, and most interesting ideas, based on the authors' teaching and research experience. After introducing the basic mathematical and computational complexity concepts, and some historical context, including the story of Enigma, the authors explain symmetric and asymmetric cryptography, electronic signatures and hash functions, PGP systems, public key infrastructures, cryptographic protocols, and applications in network security. In each case the text presents the key technologies, algorithms, and protocols, along with methods of design and analysis, while the content is characterized by a visual style and all algorithms are presented in readable pseudocode or using simple graphics and diagrams. The book is suitable for undergraduate and graduate courses in computer science and engineering, particularly in the area of networking, and it is also a suitable reference text for self-study by practitioners and researchers. The authors assume only basic elementary mathematical experience, the text covers the foundational mathematics and computational complexity theory. 250 pp. Englisch. N° de réf. du libraire 9783642413858

Plus d'informations sur ce vendeur | Poser une question au libraire

Acheter neuf
EUR 53,49
Autre devise

Ajouter au panier

Frais de port : EUR 17,14
De Allemagne vers Etats-Unis
Destinations, frais et délais

autres exemplaires de ce livre sont disponibles

Afficher tous les résultats pour ce livre