This introduction to cryptography uses a programming-oriented approach to study important current cryptographic schemes and the main cryptanalytic attacks against them. The Maple implementations include many examples with parameters of realistic size.
Produktinformation
Utgivningsdatum:2015-01-29
Mått:155 x 235 x 40 mm
Vikt:1 095 g
Format:Häftad
Språk:Engelska
Antal sidor:706
Upplaga:2013
Förlag:Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
José Luis Gómez Pardo is a full professor of the Departamento de Alxebra, Facultade de Matematicas, Universidade de Santiago. He has taught undergraduate and graduate courses in cryptography to mathematics and computer science students.
Recensioner i media
From the reviews: "A valuable guide to the practical applications and intricate workings of modern cryptographic systems. ... The work is most useful for those interested in the deep mechanics and mathematics of cryptosystems. ... Pardo does an excellent job of considering the algorithmic properties and conversions required for practical use of each cryptosystem within the Maple environment. This is an important resource for those interested in learning how to apply and implement cryptosystems within Maple ... . Summing Up: Highly recommended. Graduate students, researchers/faculty, and professionals/practitioners." (T. D. Richardson, Choice, Vol. 50 (11), August, 2013) "In this book, the authors make a significant contribution to the explanation of cryptographic algorithms using Maple code. ... The book is well structured and easy to follow. It is a good self-study book for computer science or mathematics students, and for engineers who work in cryptography." (Zheng Gong, Computing Reviews, May, 2013)
Innehållsförteckning
Preface.- Introduction.- Chap. 1 Classical Ciphers.- Chap. 2 Basic Concepts.- Chap. 3 Private-Key Encryption.- Chap. 4 Block Ciphers and Modes of Operation.- Chap. 5 Message Authentication.- Chap. 6 Algorithmic Number - Theory for Cryptography.- Chap. 7 Introduction to Public-Key Cryptography.- Chap. 8 Public-Key Encryption.- Chap. 9 Digital Signatures.- Chap. 10 Identity-Based Cryptography.- Chap. 11 Elliptic Curve Cryptography.- App. A Some Maple Conversion Functions.- Acronyms.- References.- Index.