TOP
0
0
三民出版.新書搶先報|最速、最優惠的新鮮貨報給你知!
Cryptography ─ Theory And Practice
90折

Cryptography ─ Theory And Practice

商品資訊

定價
:NT$ 2924 元
優惠價
902632
無庫存,下單後進貨(到貨天數約45-60天)
下單可得紅利積點:78 點
商品簡介
目次
相關商品

商品簡介

THE LEGACY…First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography.WHY A THIRD EDITION?The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering:Pseudorandom bit generation in cryptographyEntity authentication, including schemes built from primitives and special purpose "zero-knowledge" schemesKey establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofsPublic key infrastructure, including identity-based cryptographySecret sharing schemesMulticast security, including broadcast encryption and copyright protectionTHE RESULT…Providing mathematical background in a "just-in-time" fashion, informal descriptions of cryptosystems along with more precise pseudocode, and a host of numerical examples and exercises, Cryptography: Theory and Practice, Third Edition offers comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the mind-boggling amount of information circulating around the world.

目次

CLASSICAL CRYPTOGRAPHYIntroduction: Some Simple CryptosystemsCryptanalysisNotesExercisesSHANNON'S THEORYIntroductionElementary Probability TheoryPerfect SecrecyEntropyProperties of EntropySpurious Keys and Unicity DistanceProduct CryptosystemsNotesExercisesBLOCK CIPHERS AND THE ADVANCED ENCRYPTION STANDARDIntroductionSubstitution-Permutation NetworksLinear CryptanalysisDifferential CryptanalysisThe Data Encryption StandardThe Advanced Encryption StandardModes of OperationNotes and ReferencesExercisesCRYPTOGRAPHIC HASH FUNCTIONSHash Functions and Data IntegritySecurity of Hash FunctionsIterated Hash FunctionsMessage Authentication CodesUnconditionally Secure MACsNotes and ReferencesExercisesTHE RSA CRYPTOSYSTEM AND FACTORING INTEGERSIntroduction to Public-key CryptographyMore Number TheoryThe RSA CryptosystemPrimality TestingSquare Roots Modulo nFactoring AlgorithmsOther Attacks on RSAThe Rabin CryptosystemSemantic Security of RSANotes and ReferencesExercisesPUBLIC-KEY CRYPTOGRAPHY AND DISCRETE LOGARITHMSThe ElGamal CryptosystemAlgorithms for the Discrete Logarithm ProblemLower Bounds on the Complexity of Generic AlgorithmsFinite FieldsElliptic CurvesDiscrete Logarithm Algorithms in PracticeSecurity of ElGamal SystemsNotes and ReferencesExercisesSIGNATURE SCHEMESIntroductionSecurity Requirements for Signature SchemesThe ElGamal Signature SchemeVariants of the ElGamal Signature SchemeProvably Secure Signature SchemesUndeniable SignaturesFail-stop SignaturesNotes and ReferencesExercisesPSEUDO-RANDOM NUMBER GENERATIONIntroduction and ExamplesIndistinguishability of Probability DistributionsThe Blum-Blum-Shub GeneratorProbabilistic EncryptionNotes and ReferencesExercisesIDENTIFICATION SCHEMES AND ENTITY AUTHENTICATIONIntroductionChallenge-and-Response in the Secret-Key SettingChallenge-and-Response in the Public-Key SettingThe Schnorr Identification SchemeThe Okamoto Identification SchemeThe Guillou-Quisquater Identification SchemeNotes and ReferencesExercisesKEY DISTRIBUTIONIntroductionDiffie-Hellman Key PredistributionUnconditionally Secure Key PredistributionKey Distribution PatternsSession Key Distribution SchemesNotes and ReferencesExercisesKEY AGREEMENT SCHEMESIntroductionDiffie-Hellman Key AgreementMTI Key Agreement SchemesKey Agreement Using Self-Certifying KeysEncrypted Key ExchangeConference Key Agreement SchemesNotes and ReferencesExercisesPUBLIC-KEY INFRASTRUCTUREIntroduction: What is a PKI?CertificatesTrust ModelsThe Future of PKI?Identity-Based CryptographyNotes and ReferencesExercisesSECRET SHARING SCHEMESIntroduction: The Shamir Threshold SchemeAccess Structures and General Secret SharingInformation Rate and Construction of Efficient SchemesNotes and ReferencesExercisesMULTICAST SECURITY AND COPYRIGHT PROTECTIONIntroduction to Multicast SecurityBroadcast EncryptionMulticast Re-KeyingCopyright ProtectionTracing Illegally Redistributed KeysNotes and ReferencesExercisesFURTHER READINGBIBLIOGRAPHYINDEX

您曾經瀏覽過的商品

購物須知

外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。

無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。

為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。

若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

優惠價:90 2632
無庫存,下單後進貨
(到貨天數約45-60天)

暢銷榜

客服中心

收藏

會員專區