Introduction to Cryptography, 2nd edition

Introduction to Cryptography, 2nd edition

2004-07-13 | ISBN: 0387207562 | PDF | 338 Pages | 6.95 MB

This book explains the basic methods of modern cryptography. It is written for readers with only basic mathematical knowledge who are interested in modern cryptographic algorithms and their mathematical foundation. Several exercises are included following each chapter.
Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, etc. Therefore, users should not only know how its techniques work, but they must also be able to estimate their efficiency and security. For this new edition, the author has updated the discussion of the security of encryption and signature schemes and recent advances in factoring and computing discrete logarithms. He has also added descriptions of time-memory trade of attacks and algebraic attacks on block ciphers, the Advanced Encryption Standard, the Secure Hash Algorithm, secret sharing schemes, and undeniable and blind signatures.
Johannes A. Buchmann is a Professor of Computer Science and Mathematics at the Technical University of Darmstadt, and the Associate Editor of the Journal of Cryptology. In 1985, he received the Feodor Lynen Fellowship of the Alexander von Humboldt Foundation. Furthermore, he has received the most prestigious award in science in Germany, the Leibniz Award of the German Science Foundation.


[Fast Download] Introduction to Cryptography, 2nd edition

Related eBooks:
Abstract Algebra: Applications to Galois Theory, Algebraic Geometry and Cryptography
Advances in Cryptology - CRYPTO 2013, Part I
Improving Image Quality in Visual Cryptography
Tokenomics: The Crypto Shift of Blockchains, ICOs, and Tokens
Blockchain Quick Start Guide
Unblocked: How Blockchains Will Change Your Business (and What to Do About It)
Financial Cryptography and Data Security
Topics in Cryptology - CT-RSA 2001
Progress in Cryptology - INDOCRYPT 2005
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies
Cryptography: Theory and Practice, 3rd Edition
Handbook of Applied Cryptography
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.