Cryptography(English, Hardcover, Stinson Douglas R.) | Zipri.in
Cryptography(English, Hardcover, Stinson Douglas R.)

Cryptography(English, Hardcover, Stinson Douglas R.)

Quick Overview

Rs.1713 on FlipkartBuy
Product Price Comparison
THE LEGACY… First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography. WHY A THIRD EDITION? The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering: Pseudorandom bit generation in cryptography Entity authentication, including schemes built from primitives and special purpose "zero-knowledge" schemes Key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs Public key infrastructure, including identity-based cryptography Secret sharing schemes Multicast security, including broadcast encryption and copyright protection THE RESULT… Providing mathematical background in a "just-in-time" fashion, informal descriptions of cryptosystems along with more precise pseudocode, and a host of numerical examples and exercises, Cryptography: Theory and Practice, Third Edition offers comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the mind-boggling amount of information circulating around the world. Salient Features Provides comprehensive coverage along with the latest developments in cryptography Covers many new practical schemes, such as Guillou-Quisquater, Okamoto, and Schnorr schemes Details the various types of protocols and how party identities are verified Includes digital fingerprinting schemes, multicast security, and copyright protection issues Supplies rigorous analysis of cryptographic protocols for identification, key distribution, and key agreement Contains numerous examples and exercises