| 000 | 00000cam u2200205 a 4500 | |
| 001 | 000046130568 | |
| 005 | 20221017132957 | |
| 008 | 221017s2021 flua b 001 0 eng d | |
| 020 | ▼a 9780815354369 | |
| 035 | ▼a (KERIS)BIB000015960780 | |
| 040 | ▼a 211014 ▼c 211014 ▼d 211009 | |
| 082 | 0 4 | ▼a 005.8/2 ▼2 23 |
| 084 | ▼a 005.8 ▼2 DDCK | |
| 090 | ▼a 005.8 ▼b K19i3 | |
| 100 | 1 | ▼a Katz, Jonathan, ▼d 1974-. |
| 245 | 1 0 | ▼a Introduction to modern cryptography / ▼c Jonathan Katz, Yehuda Lindell. |
| 250 | ▼a 3rd ed. | |
| 260 | ▼a Boca Raton : ▼b CRC Press/Taylor & Francis, ▼c 2021. | |
| 300 | ▼a xx, 626 p. : ▼b ill. ; ▼c 25 cm. | |
| 490 | 1 | ▼a Chapman & hall/crc cryptography and network security series |
| 504 | ▼a Includes bibliographical references and index. | |
| 650 | 0 | ▼a Computer security. |
| 650 | 0 | ▼a Cryptography. |
| 700 | 1 | ▼a Lindell, Yehuda. |
| 830 | 0 | ▼a Chapman & hall/crc cryptography and network security series. |
| 945 | ▼a ITMT |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 K19i3 | 등록번호 121260992 (3회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal definitions, rigorous proofs of security.
Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal definitions, rigorous proofs of security.
정보제공 :
목차
1. Introduction. 2. Perfectly Secret Encryption. 3. Private-Key Encryption. 4. Message Authentication Codes. 5. CCA-Security and Authenticated Encryption. 6. Hash Functions and Applications. 7. Practical Constructions of Symmetric-Key Primitives. 8. *Theoretical Constructions of Symmetric-Key Primitives. 9. Number Theory and Cryptographic Hardness Assumptions. 10. *Algorithms for Factoring and Computing Discrete Logarithms. 11. Key Management and the Public-Key Revolution. 12. Public-Key Encryption. 13. Digital Signature Schemes. 14. *Post-Quantum Cryptography. 15. *Advanced Topics in Public-Key Encryption.
