Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Image from Google Jackets

Introduction to cryptography with Maple / Jose Luis Gomez Pardo.

By: Material type: TextTextPublication details: Berlin : Springer-Verlag, c2013.Description: xxx, 705 p. : ill. ; 24 cmISBN:
  • 9783642321658 (alk. paper)
Subject(s): DDC classification:
  • 23 G633 005.82
Contents:
1. Classical Ciphers and Their Cryptanalysis -- 2. Basic Concepts from Probability, Complexity, Algebra and Number Theory -- 3. Private-Key Encryption -- 4. Block Ciphers and Modes of Operation -- 5. Message Authentication -- 6. Algorithmic Number Theory for Cryptography and Cryptanalysis: Primality, Factoring and Discrete Logarithms -- 7. Introduction to Public-Key Cryptography: The Diffie-Hellman Protocol -- 8. Public-Key Encryption -- 9. Digital Signatures -- 10. Identity-Based Cryptography -- 11. An Introduction to Elliptic Curve Cryptography-- Appendix A-- References-- Index.
Summary: "This introduction to cryptography employs a programming-oriented approach to study the most important cryptographic schemes in current use and the main cryptanalytic attacks against them. Discussion of the theoretical aspects, emphasizing precise security definitions based on methodological tools such as complexity and randomness, and of the mathematical aspects, with emphasis on number-theoretic algorithms and their applications to cryptography and cryptanalysis, is integrated with the programming approach, thus providing implementations of the algorithms and schemes as well as examples of realistic size."--
Tags from this library: No tags from this library for this title. Log in to add tags.

Includes bibliographical references and index.

1. Classical Ciphers and Their Cryptanalysis --
2. Basic Concepts from Probability, Complexity, Algebra and Number Theory --
3. Private-Key Encryption --
4. Block Ciphers and Modes of Operation --
5. Message Authentication --
6. Algorithmic Number Theory for Cryptography and Cryptanalysis: Primality, Factoring and Discrete Logarithms --
7. Introduction to Public-Key Cryptography: The Diffie-Hellman Protocol --
8. Public-Key Encryption --
9. Digital Signatures --
10. Identity-Based Cryptography --
11. An Introduction to Elliptic Curve Cryptography--

Appendix A--
References--
Index.



"This introduction to cryptography employs a programming-oriented approach to study the most important cryptographic schemes in current use and the main cryptanalytic attacks against them. Discussion of the theoretical aspects, emphasizing precise security definitions based on methodological tools such as complexity and randomness, and of the mathematical aspects, with emphasis on number-theoretic algorithms and their applications to cryptography and cryptanalysis, is integrated with the programming approach, thus providing implementations of the algorithms and schemes as well as examples of realistic size."--

There are no comments on this title.

to post a comment.
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in