34,95 €
34,95 €
inkl. MwSt.
Sofort per Download lieferbar
Versandkostenfrei*
17 °P sammeln
34,95 €
34,95 €
inkl. MwSt.
Sofort per Download lieferbar
Versandkostenfrei*

Alle Infos zum eBook verschenken
17 °P sammeln
Als Download kaufen
34,95 €
inkl. MwSt.
Sofort per Download lieferbar
17 °P sammeln
Jetzt verschenken
34,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
17 °P sammeln
  • Format: PDF


This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material used by the authors and given as examinations to advanced-level students of the Cryptography and Security Lecture at EPFL from 2000 to mid-2005. A Classical Introduction to Cryptography Exercise Book covers a majority of the subjects that make up today's cryptology, including symmetric or public-key cryptography, cryptographic protocols, design, cryptanalysis, and implementation of cryptosystems. Exercises do…mehr

Produktbeschreibung
This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material used by the authors and given as examinations to advanced-level students of the Cryptography and Security Lecture at EPFL from 2000 to mid-2005. A Classical Introduction to Cryptography Exercise Book covers a majority of the subjects that make up today's cryptology, including symmetric or public-key cryptography, cryptographic protocols, design, cryptanalysis, and implementation of cryptosystems. Exercises do not require an extensive background in mathematics, since the most important notions are introduced and discussed in many of the exercises. The authors expect the readers to be comfortable with basic facts of discrete probability theory, discrete mathematics, calculus, algebra, and computer science. Following the model of A Classical Introduction to Cryptography: Applications for Communications Security, exercises related to the more advanced parts of the textbook are marked with a star. TOC:Preface.- Exercises.- Prehistory of Cryptography.- Conventional Cryptography.- Dedicated Conventional Cryptographic Primitives.- Conventional Security Analysis.- Security Protocols with Conventional Cryptography.- Algorithmic Algebra.- Algorithmic Number Theory.- Elements of Complexity Theory.- Public Key Cryptography.- Digital Signatures.- Cryptographic Protocols.- From Cryptography to Communication Security.- Bibliography.- Index.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

  • Produktdetails
  • Verlag: Springer-Verlag GmbH
  • Erscheinungstermin: 06.08.2007
  • Englisch
  • ISBN-13: 9780387288352
  • Artikelnr.: 37286378
Autorenporträt
Thomas Baigneres, EPFL-I&C-LASEC, Lausanne, Switzerland / Pascal Junod, Kudeslki Group / Yi Lu, EPFL-I&C-LASEC, Lausanne, Switzerland / Jean Monnerat, EPFL-I&C-LASEC, Lausanne, Switzerland / Serge Vaudenay, EPFL-I&C-LASEC, Lausanne, Switzerland
Inhaltsangabe
Prehistory of Cryptography.- Conventional Cryptography.- Dedicated Conventional Cryptographic Primitives.- Conventional Security Analysis.- Security Protocols with Conventional Cryptography.- Algorithmic Algebra.- Algorithmic Number Theory.- Elements of Complexity Theory.- Public Key Cryptography.- Digital Signatures.- Cryptographic Protocols.- From Cryptography to Communication Security.
Rezensionen
From the reviews:

"This companion exercise and solution book to A Classical Introduction to Cryptography ... contains a carefully revised version of teaching material used by the authors and given as examinations to advanced level students of the Cryptography and Security Lecture at EPFL from 2000 to mid-2005. This book covers a majority of the subjects that make up today's cryptography ... . Exercises do not require an extensive background in mathematics, since the most important notions are introduced and discussed ... ." (Cryptologia, Vol. 30, 2006)