Introduction to Cryptography: With Coding TheoryPrentice Hall, 2002 - 490 sayfa This book assumes a minimal background in programming and a level of math sophistication equivalent to a course in linear algebra. It provides a flexible organization, as each chapter is modular and can be covered in any order. Using Mathematica, Maple, and MATLAB, computer examples included in an Appendix explain how to do computation and demonstrate important concepts. A full chapter on error correcting codes introduces the basic elements of coding theory. Other topics covered: Classical cryptosystems, basic number theory, the data encryption standard, AES: Rijndael, the RSA algorithm, discrete logarithms, digital signatures, e-commerce and digital cash, secret sharing schemes, games, zero knowledge techniques, key establishment protocols, information theory, elliptic curves, error correcting codes, quantum cryptography. For professionals in cryptography and network security. |
Diğer baskılar - Tümünü görüntüle
Introduction to Cryptography: With Coding Theory Wade Trappe,Lawrence C. Washington Metin Parçacığı görünümü - 2006 |
Sık kullanılan terimler ve kelime öbekleri
affine cipher algorithm Alice and Bob attack b₁ BCH codes binary birthday attack bits block bytes c₁ calculate chooses a random cipher ciphertext codeword coefficients column congruence corresponding cryptographic cryptosystem decoding decryption digits discrete log discrete logarithm dot product elements ElGamal elliptic curve encryption entries entropy equation example exponent finite field frequency Hamming Hamming code Hill cipher input integer integers mod inverse large prime length letters linear code method mod q multiple nonzero obtain one-time pad output parity check matrix password Peggy permutation photon plaintext polynomial possible prime factors primitive root probability problem procedure protocol public key quantum computer r₁ random number recurrence root mod rows of G S-box scheme secret Section sends sequence shift Show signature solution square root substitution cipher Suppose theorem values vector yields