Cryptography: Theory and Practice (Textbooks in Mathematics)
Authors: Douglas Robert Stinson – Maura Paterson
ISBN-10: 1138197017
ISBN-13: 9781138197015
Edition 版次: 4
Publication Date 出版日期: 2018-09-11
Print Length 页数: 598 pages
5
Through three editions,Cryptography: Theory and Practice,has been embraced by instructors and students alike. It offers a comprehensive primer for the subject’s fundamentals while presenting the most current advances in cryptography.
The authors offer comprehensive,in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating around the world.
Key Features of the Fourth Edition 版次:
New chapter on the exciting,emerging new area of post-quantum cryptography (Chapter 9).
New high-level,nontechnical overview of the goals and tools of cryptography (Chapter 1).
New mathematical appendix that summarizes definitions and main results on number theory and algebra (Appendix A).
An expanded treatment of stream ciphers,including common design techniques along with coverage of Trivium.
Interesting attacks on cryptosystems,including:
padding oracle attack
correlation attacks and algebraic attacks on stream ciphers
attack on the DUAL-EC random bit generator that makes use of a trapdoor.
A treatment of the sponge construction for hash functions and its use in the new SHA-3 hash standard.
Methods of key distribution in sensor networks.
The basics of visual cryptography,allowing a secure method to split a secret visual message into pieces (shares) that can later be combined to reconstruct the secret.
The fundamental techniques cryptocurrencies,as used in Bitcoin and blockchain.
The basics of the new methods employed in messaging protocols such as Signal,including deniability and Diffie-Hellman key ratcheting.
Cryptography: Theory and Practice,4th Edition
相关推荐
- Cloud Native Application Protection Platforms: A Guide to CNAPPs and the Foundations of Comprehensive Cloud Security
- Ethical Password Cracking: Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
- Federated Learning for Future Intelligent Wireless Networks
- Artificial Intelligence and Machine Learning Foundations: Learning from Experience, 2nd Edition
- Cyber CISO Marksmanship: Hitting the Mark in Cybersecurity Leadership
- Ultimate WordPress Handbook: An Essential Guide to Designing Stunning WordPress Websites, Driving Traffic, and Boosting Revenue