Cryptography theory and practice

"The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest...

Full description

Saved in:
Bibliographic Details
Main Author: Stinson, Douglas R. (Douglas Robert) 1956- (Author)
Format: Book
Language:English
Published: Boca Raton, FL CRC Press 2006
Edition:Second edition
Series:CRC Press series on discrete mathematics and its applications
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 c 4500
001 53598
003 MY-KLNDU
005 20241219014511.0
008 221104 20062006flua b 001 0 eng d
020 |a 9781584885085 
039 9 |a 202211041231  |b VLOAD  |c 201906191537  |d faezah  |c 201906191537  |d faezah  |y 201905291049  |z shahrim 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a QA 268  |b .S75 2006 
100 1 |a Stinson, Douglas R.  |q (Douglas Robert)  |d 1956-  |e author 
245 1 0 |a Cryptography  |b theory and practice  |c Douglas R. Stinson 
250 |a Second edition 
264 1 |a Boca Raton, FL  |b CRC Press  |c 2006 
264 4 |c © 2006 
300 |a 593 pages  |b illustrations  |c 24 cm. 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
490 1 |a The CRC Press series on discrete mathematics and its applications 
505 0 |a Classical cryptography -- Shannon's theory -- Block ciphers and the advanced encryption standard -- Cryptographic hash functions -- The RSA Cryptosystem and factoring integers -- Public-key cryptography and discrete logarithms -- Signature schemes -- Pseudo-random number generation -- Identification schemes and entity authentication -- Key distribution -- Key agreement schemes -- Public-key infrastructure -- Secret sharing schemes -- Multicast security and copyright protection 
520 |a "The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering: pseudorandom bit generation in cryptography; entity authentication, including schemes built from primitives and special purpose zero-knowledge schemes; key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs; public key infrastructure, including identity-based cryptography; secret sharing schemes; multicast security, including broadcast encryption and copyright protection."--Book cover 
592 |a 60712/005  |b 27/5/2019  |c RM 213.99  |h Amwood 
650 0 |a Coding theory 
650 0 |a Cryptography 
830 0 |a CRC Press series on discrete mathematics and its applications 
999 |a vtls000064157  |c 53598  |d 53598