HOME > 상세정보

상세정보

An introduction to cryptography / 2nd ed

An introduction to cryptography / 2nd ed

자료유형
단행본
개인저자
Mollin, Richard A., 1947-
서명 / 저자사항
An introduction to cryptography / Richard A. Mollin.
판사항
2nd ed.
발행사항
Boca Raton :   Chapman & Hall/CRC,   c2007.  
형태사항
x, 413 p. : ill. ; 25 cm.
총서사항
Discrete mathematics and its applications
ISBN
1584886188 (acid-free paper) 9781584886181 (acid-free paper)
서지주기
Includes bibliographical references (p. 377-383) and index.
일반주제명
Coding theory --Textbooks.
000 00000cam u2200205 a 4500
001 000045365078
005 20250728110359
008 060720s2007 flua b 001 0 eng
010 ▼a 2006049639
015 ▼a GBA6A2680 ▼2 bnb
020 ▼a 1584886188 (acid-free paper)
020 ▼a 9781584886181 (acid-free paper)
035 ▼a (KERIS)REF000012720307
040 ▼a DLC ▼c DLC ▼d BAKER ▼d C#P ▼d YDXCP ▼d UKM ▼d DLC ▼d 244002 ▼d 211009
050 0 0 ▼a QA268 ▼b .M65 2007
082 0 0 ▼a 003.54 ▼2 22
090 ▼a 003.54 ▼b M726i2
100 1 ▼a Mollin, Richard A., ▼d 1947- ▼0 AUTH(211009)171817.
245 1 3 ▼a An introduction to cryptography / ▼c Richard A. Mollin.
250 ▼a 2nd ed.
260 ▼a Boca Raton : ▼b Chapman & Hall/CRC, ▼c c2007.
300 ▼a x, 413 p. : ▼b ill. ; ▼c 25 cm.
440 0 ▼a Discrete mathematics and its applications
504 ▼a Includes bibliographical references (p. 377-383) and index.
650 0 ▼a Coding theory ▼v Textbooks.

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 세종학술정보원/과학기술실(5층)/ 청구기호 003.54 M726i2 등록번호 151233459 도서상태 대출가능 반납예정일 예약 서비스 B M ?

컨텐츠정보

책소개

Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that features all of the requisite background material on number theory and algorithmic complexity as well as a historical look at the field.

With numerous additions and restructured material, this edition presents the ideas behind cryptography and the applications of the subject. The first chapter provides a thorough treatment of the mathematics necessary to understand cryptography, including number theory and complexity, while the second chapter discusses cryptographic fundamentals, such as ciphers, linear feedback shift registers, modes of operation, and attacks. The next several chapters discuss DES, AES, public-key cryptography, primality testing, and various factoring methods, from classical to elliptical curves. The final chapters are comprised of issues pertaining to the Internet, such as pretty good privacy (PGP), protocol layers, firewalls, and cookies, as well as applications, including login and network security, viruses, smart cards, and biometrics. The book concludes with appendices on mathematical data, computer arithmetic, the Rijndael S-Box, knapsack ciphers, the Silver-Pohlig-Hellman algorithm, the SHA-1 algorithm, radix-64 encoding, and quantum cryptography.

New to the Second Edition:

  • An introductory chapter that provides more information on mathematical facts and complexity theory
  • Expanded and updated exercises sets, including some routine exercises
  • More information on primality testing and cryptanalysis

    Accessible and logically organized, An Introduction to Cryptography, Second Edition is the essential book on the fundamentals of cryptography.


  • Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition features all of the requisite background material on number theory and algorithmic complexity, includes a historical look at the field, and offers updated and expanded exercise sets. In addition to updates throughout the text, this edition includes two new chapters on current and future applications that cover topics such as electronic mail, Internet security, protocol layers and SSL, firewalls, client-server model and cookies, network security, wireless security, smart cards, and biometrics. The book also provides additional information on cryptanalysis and primality testing as well as appendices on DES and primitive roots.


    정보제공 : Aladin

    목차

    Preface

    MATHEMATICAL BASICS
    Divisibility
    Primes, Primality Testing, and Induction
    An Introduction to Congruences
    Euler, Fermat, and Wilson
    Primitive Roots
    The Index Calculus and Power Residues
    Legendre, Jacobi, & Quadratic Reciprocity
    Complexity

    CRYPTOGRAPHIC BASICS
    Definitions and Illustrations
    Classic Ciphers
    Stream Ciphers
    LFSRs
    Modes of Operation
    Attacks

    DES AND AES
    S-DES and DES
    AES

    PUBLIC-KEY CRYPTOGRAPHY
    The Ideas behind PKC
    Digital Envelopes and PKCs
    RSA
    ElGamal
    DSA - The DSS

    PRIMALITY TESTING
    True Primality Tests
    Probabilistic Primality Tests
    Recognizing Primes

    FACTORING
    Classical Factorization Methods
    The Continued Fraction Algorithm
    Pollard's Algorithms
    The Quadratic Sieve
    The Elliptic Curve Method (ECM)

    ELECTRONIC MAIL AND INTERNET SECURITY
    History of the Internet and the WWW
    Pretty Good Privacy (PGP)
    Protocol Layers and SSL
    Internetworking and Security - Firewalls
    Client-Server Model and Cookies

    LEADING-EDGE APPLICATIONS
    Login and Network Security
    Viruses and Other Infections
    Smart Cards
    Biometrics


    정보제공 : Aladin

    관련분야 신착자료